Cyber Crime

OnionDuke: APT Attacks exploited the Tor Network

Experts at F-Secure discovered a link between the crew operating a rogue Tor node used to spread OnionDuke malware and…

10 years ago

A fresh C93 phishing Scam targeting Microsoft’s Windows Outlook Users

Scammers have unleashed a C93 virus scare, targeted at Microsoft’s Windows outlook users in a wide phishing campaign aimed at…

10 years ago

A new BASHLITE variant infects devices running BusyBox

A new variant of the BASHLITE malware exploiting the ShellShock vulnerability was used by cyber criminals to infect devices that…

10 years ago

Once again criminals hacked ATMs with knowledge of default settings

Two individuals exploited knowledge of the default passcode to hack ATMs and steal more than $400,000 in 18 months from…

10 years ago

How Operation Onymous managed by law enforcement impacted Tor network

What is changed after the law enforcement conducted the takedown of several illegal marketplaces as part of the Operation Onymous?…

10 years ago

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable…

10 years ago

Masque Attack – every iOS app could be compromised

Researchers at FireEye identified a new attack dubbed the Masque, which allows attackers to replace a genuine app with a…

10 years ago

Foreign state suspected of breaching US Postal Service systems

State-sponsored hackers are suspected of breaching the systems of the United States Postal Service exposing the data of more than…

10 years ago

Darkhotel – Cybercrime crew targets execs using hotel Internet

Kaspersky revealed that a crew of criminals dubbed Darkhotel targets executives traveling across Asia through hotel internet networks. Security experts…

10 years ago

Manual phishing attacks are the simplest and most effective hacking technique

A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email…

10 years ago

This website uses cookies.