Cyber Crime

Security Affairs newsletter Round 21 – Best of the week from best sourcesSecurity Affairs newsletter Round 21 – Best of the week from best sources

Security Affairs newsletter Round 21 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago
Carphone Warehouse hacked: 2.4 million customer records at riskCarphone Warehouse hacked: 2.4 million customer records at risk

Carphone Warehouse hacked: 2.4 million customer records at risk

Carphone Warehouse has taken three days to disclose about a sophisticated attack that may have impacted more than 2.4 million…

10 years ago
0-day attack on Firefox stole sensitive data and password0-day attack on Firefox stole sensitive data and password

0-day attack on Firefox stole sensitive data and password

Mozilla released the version 39.0.3 Firefox to patch a critical 0-day vulnerability that has been exploited in the wild. A zero-day…

10 years ago
ICANN urges passwords reset due an external service provider breachICANN urges passwords reset due an external service provider breach

ICANN urges passwords reset due an external service provider breach

The ICANN has issued a warning to inform who registered with ICANN.org that their profile accounts were accessed by an…

10 years ago
The Panda Emissary APT specialized in defence aerospace projectsThe Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from…

10 years ago
Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud accountMan-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The…

10 years ago
Terracotta VPN, the Chinese VPN Service as Hacking PlatformTerracotta VPN, the Chinese VPN Service as Hacking Platform

Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking…

10 years ago
The CTB-Locker Ransomware is Back with a Vengeance: Windows 10 Social EngineeringThe CTB-Locker Ransomware is Back with a Vengeance: Windows 10 Social Engineering

The CTB-Locker Ransomware is Back with a Vengeance: Windows 10 Social Engineering

The CTB-Locker Ransomware is Back with a Vengeance, the security experts noticed that bad actors Leveraging the Release of Windows…

10 years ago
Interpol is training Police officers to fight crime on the DarknetInterpol is training Police officers to fight crime on the Darknet

Interpol is training Police officers to fight crime on the Darknet

Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces.…

10 years ago
BIND Flaws exploited in DNS server attacksBIND Flaws exploited in DNS server attacks

BIND Flaws exploited in DNS server attacks

Recently we reported a new vulnerability affecting Bind, now experts at Sucuri confirmed that the flaw is being exploited in…

10 years ago