Cyber Crime

ICANN urges passwords reset due an external service provider breach

The ICANN has issued a warning to inform who registered with ICANN.org that their profile accounts were accessed by an…

10 years ago

The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from…

10 years ago

Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The…

10 years ago

Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking…

10 years ago

The CTB-Locker Ransomware is Back with a Vengeance: Windows 10 Social Engineering

The CTB-Locker Ransomware is Back with a Vengeance, the security experts noticed that bad actors Leveraging the Release of Windows…

10 years ago

Interpol is training Police officers to fight crime on the Darknet

Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces.…

10 years ago

BIND Flaws exploited in DNS server attacks

Recently we reported a new vulnerability affecting Bind, now experts at Sucuri confirmed that the flaw is being exploited in…

10 years ago

RIG Exploit Kit 3.0 infected over 1.3 Million PC worldwide

Version 3.0 of the RIG exploit kit has been released with new significant improvement. It has already infected more than…

10 years ago

Operation Potao – hackers used a trojanized version of TrueCrypt

ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized…

10 years ago

Security Affairs newsletter Round 20 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago

This website uses cookies.