Cyber Crime

Crooks abuse Facebook app platform for phishing attacks

Crooks are abusing the Facebook app platform to carry out some very insidious phishing attacks against the users of the…

10 years ago

Businesses pay $100k to alleged Armada Collective to avoid DDoS

Businesses have already paid more than $100,000 to DDoS extortionists who claim to be the dreaded Armada Collective, but that…

10 years ago

Dogspectus ransomware campaign relies on Leaked Hacking Team Exploits and Towelroot

Blue Coat spotted a new ransomware-based campaign serving the Dogspectus malware. Crooks combined a Hacking Team exploit and the Towelroot…

10 years ago

GozNym Trojan even more sophisticated with a singular redirection mechanism

The cybercriminals behind the GozNym Trojan have started targeting users in European countries with a new singular redirection mechanism. Last…

10 years ago

Bangladesh Bank heist gang used a malware and could strike again

A report published by the BAE firm reveals that criminals who stole $101 million from Bangladesh bank used a malware…

10 years ago

Bogus social button plugin redirects to Angler Exploit Kit

Experts at Malwarebytes observed a new attack pattern that relies on fake social button plugin that redirects visitors to Angler…

10 years ago

Dutch police seize the Ennetcom encrypted communication network

The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users.…

10 years ago

Bangladesh Bank hacked due to inadequate defense systems

Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches…

10 years ago

JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you…

10 years ago

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

10 years ago

This website uses cookies.