Cyber Crime

Spam campaign spreads Dridex Trojan via Macros in XML Files

Experts at Trustwave have discovered a spam campaign composed of several hundred messages trying to serve Dridex trojan though xml…

11 years ago

NCA, British National Crime Agency arrested a suspected Pentagon Hacker

British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack…

11 years ago

SIGA data breach exposed confidential data of 98000 US Military Personnel

Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were…

11 years ago

Identity Fraud Cost US Consumers $16 billion in 2014, less than in 2013

The annual study published by Javelin Strategy & Research on identity fraud estimates that U.S. consumers actually suffered fewer losses…

11 years ago

Financial Trojans in 2014 – Symantec reports a significant drop in infections

Symantec revealed observed a significant drop in the number of  Financial Trojans in 2014, a report includes a detailed analysis…

11 years ago

GoDaddy accounts compromised to run a campaign based on Angler kit

Experts at Cisco discovered a new technique dubbed Domain Shadowing consisting in the creation of thousand subdomains used to spread…

11 years ago

Cyber criminals target call center operators in Apple Pay fraud schema

Cybercriminals are targeting call centers operators in Apple Pay fraud to circumvent the checks implemented by Apple, banks and card…

11 years ago

TorrentLocker campaign uses email authentication to tune the operations

The emails of a new TorrentLocker campaign use Domain-based Message Authentication, Reporting and Conformance (DMARC) to avoid detection and collect…

11 years ago

The transportation giant Uber discloses a Data Breach

The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly…

11 years ago

Cyber criminals target trading algorithms to steal related code

Security firms discovered a significant increase in the number of targeted attacks aimed at stealing the code related trading algorithms.…

11 years ago

This website uses cookies.