Cyber Crime

Linux Mint was hacked, website served malicious ISO on Saturday

The Linux Mint website had been hacked, on Saturday, intruders were able to compromise it and serve malicious ISO of…

10 years ago

Project Cumulus – Tracking fake phished credentials leaked to Dark Web

Project Cumulus - A group of experts at Bitglass used watermarks to track data through the Dark Web and discover…

10 years ago

Malicious spam campaign capitalizes the global interest in the Zika virus

The cybercrime ecosystem is getting ready to exploit the media attention on the Zika virus infections for illegal activities. Be…

10 years ago

Locky Ransomware uses AES to encrypt Local Files and Unmapped Network Shares

Security researchers discovered a strain of ransomware called Locky that uses AES encryption to encrypt local files and files on…

10 years ago

Thousands of WordPress websites used as a platform to launch DDOS

In a recent investigation case, security researchers at Sucuri revealed that 26,000 different WordPress sites were exploited to launch Layer…

10 years ago

A sophisticated variant of OceanLotus trojan targets OS X systems

In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being…

10 years ago

Researcher hacks medical devices and the whole hospital with ease

Sergey Lozhkin, a security expert at Kaspersky Lab demonstratd how it is easy for hackers to compromise medical devices and…

10 years ago

$103,000 stolen in Brain Wallets cracking attacks

A group of researchers discovered that roughly 1,000 brain wallets have been drained by cyber criminals that have stolen $103,000…

10 years ago

Ransomware demanded $3.6M after takes offline the Hollywood Presbyterian Medical Center

Cyber criminals demanded $3.6M after a ransomware-based attack takes offline the systems at the Hollywood Presbyterian Medical Center. In the…

10 years ago

Mazar Bot actively targeting Android devices and wiping them

A new malware dubbed Mazar Bot is threatening Android users and has the ability to gain root access to the mobile device and completely…

10 years ago

This website uses cookies.