Cyber Crime

ICANN urges passwords reset due an external service provider breachICANN urges passwords reset due an external service provider breach

ICANN urges passwords reset due an external service provider breach

The ICANN has issued a warning to inform who registered with ICANN.org that their profile accounts were accessed by an…

10 years ago
The Panda Emissary APT specialized in defence aerospace projectsThe Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from…

10 years ago
Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud accountMan-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The…

10 years ago
Terracotta VPN, the Chinese VPN Service as Hacking PlatformTerracotta VPN, the Chinese VPN Service as Hacking Platform

Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking…

10 years ago
The CTB-Locker Ransomware is Back with a Vengeance: Windows 10 Social EngineeringThe CTB-Locker Ransomware is Back with a Vengeance: Windows 10 Social Engineering

The CTB-Locker Ransomware is Back with a Vengeance: Windows 10 Social Engineering

The CTB-Locker Ransomware is Back with a Vengeance, the security experts noticed that bad actors Leveraging the Release of Windows…

10 years ago
Interpol is training Police officers to fight crime on the DarknetInterpol is training Police officers to fight crime on the Darknet

Interpol is training Police officers to fight crime on the Darknet

Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces.…

10 years ago
BIND Flaws exploited in DNS server attacksBIND Flaws exploited in DNS server attacks

BIND Flaws exploited in DNS server attacks

Recently we reported a new vulnerability affecting Bind, now experts at Sucuri confirmed that the flaw is being exploited in…

10 years ago
RIG Exploit Kit 3.0 infected over 1.3 Million PC worldwideRIG Exploit Kit 3.0 infected over 1.3 Million PC worldwide

RIG Exploit Kit 3.0 infected over 1.3 Million PC worldwide

Version 3.0 of the RIG exploit kit has been released with new significant improvement. It has already infected more than…

10 years ago
Operation Potao – hackers used a trojanized version of TrueCryptOperation Potao – hackers used a trojanized version of TrueCrypt

Operation Potao – hackers used a trojanized version of TrueCrypt

ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized…

10 years ago
Security Affairs newsletter Round 20 – Best of the week from best sourcesSecurity Affairs newsletter Round 20 – Best of the week from best sources

Security Affairs newsletter Round 20 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago