Web Intelligence experts at Recorded Future issued the second part of the analysis on the usage of encryption by Al-Qaeda after the Snowden leaks. In May 2014 web intelligence firm Recorded Future published an interesting research on the use of encryption made by Al-Qaeda after the Snowden leaks. The study reported that members of Al-Qaeda are developing […]
The Kaspersky Lab Team has issued a report which includes details of the investigation related to the Energetic Bear â Crouching Yeti APT campaign. Energetic Bear, aka Crouching Yeti, is the recently discovered APT campaign that targeted energy companies, manufacturers, industrial, pharmaceutical, construction, and many IT companies. Security experts have analyzed the Energetic Bear APT campaign, which appears […]
CyberESI firm revealed that Chinese hackers members of the Comment Crew group violated the corporate networks of top Israeli defense companies. Once again a news refers of Chinese hackers, alleged members of the Comment Crew group, who have conducted a cyber espionage campaign. This time is has been reported that the attackers violated the databases of three […]
Excerpt from the post “How Cybercrime Exploits Digital Certificates” which details means and motivation of illicit activities which abuses digital certificates. Digital certificates have been misused many times during recent years. Bad actors abused them to conduct cyber attacks against private entities, individuals and government organizations. The principal abuses of digital certificates observed by security […]
Researchers at Kaspersky Lab issued a report on the Koler ransomware, which is targeting both Android devices and desktop browsers. Experts at Kaspersky Lab published a report titled “KolerâThe Police Ransomware for Android” that examines how bad actors behind the Reveton campaign have operated, Koler ransomware recently targeted Android users. The report on the Koler malware is more […]
Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud computing is becoming the paradigm most abused by cybercrime, cloud architectures represent privileged targets of cyber criminals that desire to steal data they contain or to abuse their resources to conduct cyber attacks. Two researchers, Rob […]
Experts at Palo Alto Networks uncovered a new Nigeria 419 scam scheme which is targeting businesses in a malicous campaign dubbed Silver Spaniel. The Nigeria 419 schema adopted by criminal gangs world wide has been improved by scammers which are also including the use of remote access trojans (RATs). A report published by the Palo […]
Hackers steal user contact information and other data from a database of the European Central Bank website in an attempt of extortion. Financial institutions are under attack, the number of cyber attacks against banking industry is increasing constantly, last malicious campaign discovered in order of time is the Operation Emmental. A few days ago, bad […]
Security experts at Incapsula are observing a surge in the used of fake Googlebots to launch and carry out application-layer DDoS. Googlebots crawl websites are the software used to index and rank the content of websites for the popular search engine. It’s not a mystery that the visits of Googlebots are not considered a possible indicator […]
Trend Micro has discovered a malicious campaign named Operation Emmental, which is targeting online banking systems of financial institutions worldwide. Trend Micro has published a report on a hacking campaign dubbed “Operation Emmental” which targeted Swiss bank accounts whit a multi-faceted attack that is able to bypass two factor authentication implemented by the organization to secure its customers. The […]