Cyber Crime

Necurs botnet: the resurrection of the monster and the rising of spam

Necurs botnet, the monster is resurrected. Banking Trojans and Ransomware propagated via spam is bring backing the high-volume spam campaign…

10 years ago

Adware Campaign borrows Obfuscation Techniques from Operation Aurora attack

Experts from Carbon Black have spotted a new Adware campaign leveraging on sophisticated obfuscation techniques borrowed from Operation Aurora. Security…

10 years ago

150,000 IoT Devices behind the 1Tbps DDoS attack on OVH

The hosting provider OVH continues to face massive DDoS attacks launched by a botnet composed at least of 150000 IoT…

10 years ago

Fancy Bear Hackers use a new Mac Trojan against aerospace industry

Researchers at Palo Alto spotted a new campaign of the Russian Fancy Bear APT using a new Mac OS X…

10 years ago

The Libyan Scorpions group is behind a cyber espionage campaign in Lybia

The Cyberkov Security Incident Response team spotted a cyber espionage campaign in Lybia conducted by a group named Libyan Scorpions.…

10 years ago

Security firm Sucuri analyzed tens of thousands of compromised websites

Security firm Sucuri published a detailed study, titled Hacked Website Report for 2016/Q2, on compromised websites on the Internet. According to…

10 years ago

OVH hosting hit by 1Tbps DDoS attack, the largest one ever seen

The hosting company OVH was the victim of a 1 Tbps DDoS attack that hit its servers, this is the…

10 years ago

Australian Police warns of malware-laden USB drives left in letterboxes

The Police in the Australian State of Victoria issued a warning to the local population of malware-laden USB drives left…

10 years ago

Pippa Middleton private photos stolen in an Apple iCloud hack

In what could be another serious celebrity hack, 3,000 photos have been stolen from Pippa Middleton ’s account and they…

10 years ago

Cyber crooks focus on the future as ATM Biometric Skimmers go on Sale

Kaspersky Lab presented an investigation on the future of ATM Biometric Skimmers and how cybercriminals could exploit them. A recent…

10 years ago

This website uses cookies.