Cyber Crime

A new Facebook scam in the wild aims to steal sensitive dataA new Facebook scam in the wild aims to steal sensitive data

A new Facebook scam in the wild aims to steal sensitive data

A new Facebook scam in the wild that aim to steal sensitive data proposing a “Facebook Recovery” Accounts that share…

10 years ago
Thamar Reservoir – Iranian hackers target entities in Middle EastThamar Reservoir – Iranian hackers target entities in Middle East

Thamar Reservoir – Iranian hackers target entities in Middle East

Security experts at ClearSky have published a report on the a cyber espionage campaign dubbed Thamar Reservoir that is targeting…

10 years ago
The FBI is not able to monitor ISIS’s encrypted communicationsThe FBI is not able to monitor ISIS’s encrypted communications

The FBI is not able to monitor ISIS’s encrypted communications

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges…

10 years ago
APWG Global Phishing Survey – Registered malicious domains increased in H2 2014APWG Global Phishing Survey – Registered malicious domains increased in H2 2014

APWG Global Phishing Survey – Registered malicious domains increased in H2 2014

The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope…

10 years ago
Compromised SSH keys used to access popular GitHub repositoriesCompromised SSH keys used to access popular GitHub repositories

Compromised SSH keys used to access popular GitHub repositories

Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using…

10 years ago
NjRat campaign coming from Saudi Arabia is using old FakeAv tacticsNjRat campaign coming from Saudi Arabia is using old FakeAv tactics

NjRat campaign coming from Saudi Arabia is using old FakeAv tactics

Security experts discovered a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication…

10 years ago
Google blocks Chrome extensions out of the official StoreGoogle blocks Chrome extensions out of the official Store

Google blocks Chrome extensions out of the official Store

The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not…

10 years ago
US financial industry moves under a rising wave of Cyberattacks and Zero-Day threats on I.R.S Tax ReturnsUS financial industry moves under a rising wave of Cyberattacks and Zero-Day threats on I.R.S Tax Returns

US financial industry moves under a rising wave of Cyberattacks and Zero-Day threats on I.R.S Tax Returns

US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are…

10 years ago
Popular Kim Dotcom’s domains, seized by the FBI, now in the hands of crooksPopular Kim Dotcom’s domains, seized by the FBI, now in the hands of crooks

Popular Kim Dotcom’s domains, seized by the FBI, now in the hands of crooks

Two of the most popular domains of ever, that were seized by the FBI from Kim Dotcom three years ago,…

10 years ago
Security Affairs newsletter Round 11 – Best of the week from best sourcesSecurity Affairs newsletter Round 11 – Best of the week from best sources

Security Affairs newsletter Round 11 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago