Cyber Crime

Grocery giants ALBERTSONS and SUPERVALU confirmed data breachGrocery giants ALBERTSONS and SUPERVALU confirmed data breach

Grocery giants ALBERTSONS and SUPERVALU confirmed data breach

US Grocery giants ALBERTSONS and SUPERVALU have confirmed a data breach that could impact customers who acquired product in national…

11 years ago
Replica of the Tor website used to serve malwareReplica of the Tor website used to serve malware

Replica of the Tor website used to serve malware

A security researcher discovered the Torbundlebrowser.org,web site that is a replica of Tor Project site, but it is used to…

11 years ago
Bad Actors rebuild from scratch the Gameover Zeus BotnetBad Actors rebuild from scratch the Gameover Zeus Botnet

Bad Actors rebuild from scratch the Gameover Zeus Botnet

Experts at Arbor networks discovered a new variant of GameOver Zeus Botnet which implement DGA scheme. Recently law enforcement agencies…

11 years ago
Reading the Malware Trend Report, Q2 2014 issued by RedSocksReading the Malware Trend Report, Q2 2014 issued by RedSocks

Reading the Malware Trend Report, Q2 2014 issued by RedSocks

RedSocks Malware Research Labs issued the Malware Trend Report Q2 2014, which contains data evolution of principal cyber threats observed…

11 years ago
AdThief malware infected jailbroken Apple devicesAdThief malware infected jailbroken Apple devices

AdThief malware infected jailbroken Apple devices

Malware expert Axelle Apvrille explained how the iOS AdThief malware infected more than 75000 jailbroken iOS devices hijacking millions advertisements.…

11 years ago
Espionage campaign hit embassies of former Soviet statesEspionage campaign hit embassies of former Soviet states

Espionage campaign hit embassies of former Soviet states

Security experts at Symantec detected a large-scale cyber espionage campaign which hit personnel at embassies of former Soviet states. Security…

11 years ago
CVE-2014-0546 vulnerability is being exploited in limited attacksCVE-2014-0546 vulnerability is being exploited in limited attacks

CVE-2014-0546 vulnerability is being exploited in limited attacks

Experts at Kaspersky Lab have detected a vulnerability in Adobe solutions coded as CVE-2014-0546 which has been already exploited in…

11 years ago
The network of USIS compromised by a cyber attackThe network of USIS compromised by a cyber attack

The network of USIS compromised by a cyber attack

Internal network of USIS was compromised by a cyber attack which has exposed Government Employees' Data. Investigators speculate on a…

11 years ago
Sophisticated evasion techniques adopted in the Op Poisoned HurricaneSophisticated evasion techniques adopted in the Op Poisoned Hurricane

Sophisticated evasion techniques adopted in the Op Poisoned Hurricane

Researchers at FireEye have uncovered a new campaign dubbed Poisoned Hurricane characterized by the use of some clever techniques to…

11 years ago
Malicious Facebook color changer App infected 10000 Users worldwideMalicious Facebook color changer App infected 10000 Users worldwide

Malicious Facebook color changer App infected 10000 Users worldwide

Security Experts at Cheetah Mobile have uncovered a new scam based on a fake Facebook Color Changer App which infected…

11 years ago