Cyber Crime

LATENTBOT, one the highly obfuscated backdoor in the wildLATENTBOT, one the highly obfuscated backdoor in the wild

LATENTBOT, one the highly obfuscated backdoor in the wild

Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye…

10 years ago
A well-funded cyber criminal group targets Asian organizationsA well-funded cyber criminal group targets Asian organizations

A well-funded cyber criminal group targets Asian organizations

Trend Micro announced that the Asian market are being targeted more than ever by well-funded cyber criminal group that appears very organized. The attacks…

10 years ago
New Spy Banker Trojan Telax exploits Google Cloud ServersNew Spy Banker Trojan Telax exploits Google Cloud Servers

New Spy Banker Trojan Telax exploits Google Cloud Servers

Security firm Zscaler discovered a malicious campaign based on a new strain of the Spy Banker banking malware. Security experts…

10 years ago
The FBI continues its crusade against the encryptionThe FBI continues its crusade against the encryption

The FBI continues its crusade against the encryption

Recent Paris attacks have raised the debate around encryption, US authorities sustain that the encryption interferes with their investigation. Recent…

10 years ago
NCA launched #CyberChoice campaign, to prevent youngsters become cyber criminalsNCA launched #CyberChoice campaign, to prevent youngsters become cyber criminals

NCA launched #CyberChoice campaign, to prevent youngsters become cyber criminals

The Britain's National Crime Agency (NCA) has launched this week #CyberChoices campaign that targets parents of youngsters aged 12-15 to…

10 years ago
Internet root servers flooded with 5 million queries a secondInternet root servers flooded with 5 million queries a second

Internet root servers flooded with 5 million queries a second

Two anomalous DDoS attacks have flooded the Internet root servers that received more than 5 million queries a second. Early…

10 years ago
The North American cyber-criminal underground it’s easy to access!The North American cyber-criminal underground it’s easy to access!

The North American cyber-criminal underground it’s easy to access!

According to a new report published by Trend Micro, the North American cyber criminal underground is very easy to access.…

10 years ago
Cadelle and Chafer, Iranian hackers are tracking dissidents and activistsCadelle and Chafer, Iranian hackers are tracking dissidents and activists

Cadelle and Chafer, Iranian hackers are tracking dissidents and activists

Symantec has uncovered Cadelle and Chafer groups, two Iran-based hacking teams that are tracking dissidents and activists. According to a new…

10 years ago
Nemesis, a bootkit used to steal payment card dataNemesis, a bootkit used to steal payment card data

Nemesis, a bootkit used to steal payment card data

Nemesis is a new strain of malware, very hard to detect and remove, designed to steal payment card data and…

10 years ago
BackStab Malware steals iOS and BlackBerry BackupsBackStab Malware steals iOS and BlackBerry Backups

BackStab Malware steals iOS and BlackBerry Backups

Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data…

10 years ago