Cyber Crime

GozNym Trojan combines Gozi ISFB and Nymaim malware abilities

The security experts from the  IBM X-Force Research spotted a new threat dubbed GozNym Trojan that combines Gozi ISFB and…

10 years ago

The Qbot malware is back with new evasion techniques

Experts at BAE Systems revealed that the Qbot malware is back with new evasion techniques and very effective polymorphic capabilities.…

10 years ago

Atmos, the Citadel Trojan successor is in the wild

Security experts from the Heimdal Security firm are issuing an alert on the Atmos malware which is the successor of…

10 years ago

British youngster pleading guilty to booter and malware sales

Teenage hacker developed a dangerous booter that was offered for sale, it was used to crash 224,000 websites around the…

10 years ago

Security experts shut down the dreaded Linux Mumblehard botnet

Researchers and law enforcement in a joint effort shut down the Mumblehard botnet composed of more than 4000 Linux machines.…

10 years ago

FBI reveals BEC attacks pilfered $2.3bn from US companies

According to a report recently issued by the FBI, cyber criminals have pilfered more than $2.3bn from 17,642 victims since…

10 years ago

Adobe fixes CVE-2016-1019 Zero-Day exploited to serve ransomware

Cyber criminals are exploiting the Flash player zero-day vulnerability (CVE-2016-1019) affecting Flash Player 21.0.0.197 and earlier disclosed by Adobe. Cyber…

10 years ago

Anonymous Philippines hacked the COMELEC. It is the biggest government related data breach

Anonymous Philippines hacked the COMELEC database, the incident exposed records of more than 55 million voters, it is the biggest…

10 years ago

TA530 group, spear phishing meets ransomware

A threat actor named TA530 group, has been targeting executives in an attempt to infect their machine with various malware,…

10 years ago

Adobe to patch Flash Player zero-day vulnerability actively exploited in the wild

A new Flash Player zero-day vulnerability (CVE-2016-1019) has been actively exploited by threat actors in attacks against systems running Windows…

10 years ago

This website uses cookies.