Cyber Crime

Magnitude exploit kit now include also the CVE-2015-3113

The French researcher Kafeine confirmed that the author of the Magnitude exploit kit have added the code to exploit the…

10 years ago

Experts found Government Credentials on the Open Web too easily

Recorded Future discovered that credentials stolen in a number of breaches and belonging to government agencies are available online on…

10 years ago

Popular travel websites warn Customers of Phishing scam

The customers of popular travel websites are targeted by phishing scam in an attempt to lure them into disclosing personal…

10 years ago

Security Affairs newsletter Round 15 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago

US Healthcare companies are the most targeted by Stegoloader

The authors of the Stegoloader malware are exploiting digital steganography to target companies worldwide, mainly US Healthcare companies. A couple…

10 years ago

SCADA systems available for sale in the Underground

Security experts have discovered the availability in underground forums of the credentials and other information related to SCADA systems. SCADA…

10 years ago

Europol arrested members of a gang behind Zeus And SpyEye

The law enforcement agencies from six European countries coordinated by the Europol have arrested members of a Ukrainian ring behind…

10 years ago

Magento payment card stealers are being used in the wild

The security researchers at Sucuri firm discovered a malicious code that could be used to steal payment card data from…

10 years ago

SEC investigates FIN4 hackers who target publicly traded firms

The U.S. Securities and Exchange Commission (SEC) is investigating on the activities related to a FIN4 APT targeting executives at…

10 years ago

Darknets in the Deep Web, the home of assassins and pedophiles

Security experts at Trend Micro published a report on the Deep Web and related illegal activities that exploit the darknets…

10 years ago

This website uses cookies.