Cyber Crime

Crooks are abusing Google Search Console to remain under the radar

Experts at Sucuri revealed that cybercriminals are abusing Google Search Console to hide their presence in compromised websites, administrators are…

10 years ago

Department of Energy hacked 159 times between 2010 and 2014

According to a review of federal records obtained by USA Today, the US Department of Energy is among the most…

10 years ago

SUCEFUL, the first multi-vendor ATM malware

According to the malware researchers at FireEye Labs Suceful is the first multi-vendor ATM malware threatening the banking industry. Experts…

10 years ago

Lockerpin, the first known Android lock-screen ransomware

Lockerpin is the first known Android lock-screen ransomware to set a phone's PIN lock that is targeting mainly US mobile…

10 years ago

ISIS hackers violated top secret British Government emails

According to an investigation by the GCHQ intelligence agency ISIS hackers targeted information held by some of David Cameron’s most…

10 years ago

Cyber criminal crew DD4BC extorts businesses via DDoS

According to a report recently issued by Akamai, the DD4BC criminal group has been responsible for at least 114 DDoS…

10 years ago

Another computer system at the Pentagon has been hacked

Another cyber attack hit computer systems at the Pentagon, this time the food court computers have been hacked exposing employees'…

10 years ago

Turla APT Group Abusing Satellite Internet Links

Security experts at Kaspersky Lab published a report on the Turla APT revealing the use Satellite links to control its…

10 years ago

Musical Chairs: Multi-Year Campaign relying on the Gh0st RAT

Security experts at Paloalto Networks have uncovered a multiyear espionage campaign dubbed Musical Chairs Involving New Variant of Gh0st RAT Malware. The Gh0st…

10 years ago

Adult Player, pornography-focused ransomware takes secret photos of victims

Security firm Zscaler spotted Adult Player, a new malicious pornography-focused ransomware that takes secret photos of victims to blackmail. Security…

10 years ago

This website uses cookies.