The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope…
Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using…
Security experts discovered a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication…
The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not…
US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are…
Two of the most popular domains of ever, that were seized by the FBI from Kim Dotcom three years ago,…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
Allegedly, the author of the "Locker" ransomware has uploaded a dump of the C2 server database, releasing private keys of…
The authors of the popular Angler exploit kit integrated an exploit for a Flash Player flaw fixed by Adobe just…
The Internal Revenue Service (IRS) was breached by hackers that "used an online service provided by the agency" to access…
This website uses cookies.