Cyber Crime

CenterPOS – The evolution of POS malware

Security Experts at FireEye discovered a new strain of POS malware dubbed CenterPOS that is threatening the retail systems. In…

10 years ago

Caution, Hackers targeted the cPanel Database

The cPanel Inc. company that manages the popular web hosting account management tool is warning customers about a possible data…

10 years ago

ENISA Threat Landscape 2015, a must reading

ENISA has issued the annual ENISA Threat Landscape 2015 a document that synthesizes the emerging trends in cyber security I'm…

10 years ago

Hackers are blackmailing the creator of Open-Source Ransomware

The Turkish security researcher Utku Sen was blackmailed by hackers behind the Magic ransomware to close his projects. The developers…

10 years ago

A new wave of attacks linked to the Codoso ATP Group

According to Palo Alto Networks’ Unit 42 the Chinese APT group Codoso has been targeting organizations in various industries in a…

10 years ago

A flaw in TeslaCrypt ransomware allows file recovering

The victims of the infamous TeslaCrypt ransomware can now rejoice, there is a free tool to decrypt files encrypted by…

10 years ago

Operators behind Angler Exploit Kit included CryptoWall 4.0

The latest variant of CryptoWall 4.0, one of the most popular and dangerous ransomware threats, has been recently added to the infamous…

10 years ago

New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have…

10 years ago

Crooks steal over $50 million from aircraft systems manufacturer FACC

The Austrian engineering firm FACC which designs Airbus, Boeing aero parts was victim of a significant cyber attack. I always…

10 years ago

TorMail hack, FBI surgical operation, or dragnet surveillance?

In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a…

10 years ago

This website uses cookies.