Cyber Crime

The US energy industry is constantly under cyber attacks

Data related to the number of incidents occurred to national infrastructure confirms that the US Government energy industry is constantly…

11 years ago

Gh0st RAT used in targeted attacks against Tibetan activists

APT actors trying to use the G20 2014 summit as a lure to compromise Tibetan nongovernmental organizations (NGOs) with Gh0st…

11 years ago

HSBC Turkey hacked, 2.7 million credit cards exposed

The International bank Hong Kong and Shanghai Banking Corporation (HSBC) announced that its systems suffered a major data breach. Last…

11 years ago

OnionDuke: APT Attacks exploited the Tor Network

Experts at F-Secure discovered a link between the crew operating a rogue Tor node used to spread OnionDuke malware and…

11 years ago

A fresh C93 phishing Scam targeting Microsoft’s Windows Outlook Users

Scammers have unleashed a C93 virus scare, targeted at Microsoft’s Windows outlook users in a wide phishing campaign aimed at…

11 years ago

A new BASHLITE variant infects devices running BusyBox

A new variant of the BASHLITE malware exploiting the ShellShock vulnerability was used by cyber criminals to infect devices that…

11 years ago

Once again criminals hacked ATMs with knowledge of default settings

Two individuals exploited knowledge of the default passcode to hack ATMs and steal more than $400,000 in 18 months from…

11 years ago

How Operation Onymous managed by law enforcement impacted Tor network

What is changed after the law enforcement conducted the takedown of several illegal marketplaces as part of the Operation Onymous?…

11 years ago

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable…

11 years ago

Masque Attack – every iOS app could be compromised

Researchers at FireEye identified a new attack dubbed the Masque, which allows attackers to replace a genuine app with a…

11 years ago

This website uses cookies.