Cyber Crime

FireEye uncovered two cyber espionage campaigns operating in parallel from China

FireEye discovered two distinct groups of Chinese hackers operating cyber espionage campaigns on a large-scale in parallel. Security experts at FireEye…

11 years ago

Malicious Chrome Extensions in official Store serve infected links on Facebook

Security experts at TrendMicro have uncovered a new malicious campaign based on a Chrome extension deployed on the official Chrome…

11 years ago

Dyre Zeus variant malware used for corporate espionage

Security experts warn Dyre malware is being used by cyber criminals for corporate espionage instead harvest banking credentials. Dyre is the…

11 years ago

Nearly 5 million alleged Google account credentials leaked

A database containing nearly million login and passwords for Google accounts has been leaked online on a Russian cyber security…

11 years ago

The HTTPS Phishing Websites will double by the end of 2014

According to the investigation conducted by experts at TrendMicro the number of HTTPS phishing sites is increasing and it will…

11 years ago

Clearsky detected Gholee malware – The Israel-Gaza Conflict Takes to the Cyber-Arena

Experts at Clearsky detected the Gholee virus which was likely developed by highly qualified factors, which may even be related…

11 years ago

TrendMicro detected a malware bypasses Chrome Extension Security Feature

Experts at TrendMicro detected a new click fraud campaign based on a malware able to bypass the Chrome Extension Security…

11 years ago

EPPB tool copies usable to download victims’ data from iCloud backups

Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak…

11 years ago

APT ported XSLCmd Backdoor on OS X according to FireEye

Security Experts at FireEye Lab discovered a new variant of the XSLCmd backdoor that has been used in targeted attacks…

11 years ago

Chinese criminal underground is doubled between 2012 and 2013

Expert at TrendMicro published a new chapter of the Cybercriminal Underground Economy Series in which analyzed the Chinese underground. Chinese…

11 years ago

This website uses cookies.