Cyber Crime

Dutch police seize the Ennetcom encrypted communication network

The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users.…

10 years ago

Bangladesh Bank hacked due to inadequate defense systems

Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches…

10 years ago

JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you…

10 years ago

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

10 years ago

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than…

10 years ago

The Australian government presents its Cyber Security Strategy

The Australian government has presented his Cyber Security Strategy and admitted the ability to conduct offensive cyber operations. The Australian…

10 years ago

A new strain of Teslacrypt implements sophisticated evasion

The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types.…

10 years ago

Multigrain PoS malware exfiltrates stolen card data over DNS

FireEye has discovered a new strain of POS malware dubbed Multigrain that steals card data from point-of-sale systems and exfiltrates…

10 years ago

The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security…

10 years ago

The CIA’s Massive Expansion in Social Media Surveillance is Just the Tip of the Iceberg

The US intelligence is massively expanding in Social Media surveillance pushing new technologies, including artificial intelligence for data mining In-Q-Tel,…

10 years ago

This website uses cookies.