Cyber Crime

Public offer of Zeus FaaS service on social network

Public offer of Zeus FaaS service on Facebook My readers know very well the dynamic of cybercrime enterprise and in particular of…

13 years ago

Verizon, large scale cyber espionage from China and much more

Verizon has issued the “2013 Data Breach Investigations Report” that investigates on a series of documented data breaches. Verizon’s RISK Team,…

13 years ago

New wave of DDoS against EU Banking can hide a sinister mystery

In the last months of 2012 a group of hackers known as “Izz ad-Din al-Qassam Cyber Fighters” conducted a series…

13 years ago

HTTP-Botnets: The Dark Side of a Standard Protocol!

When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the…

13 years ago

Group-IB detected malware that hit Russian stock-trading platform

Security firm Group-IB has detected a new variant of malware that targets the popular Russian stock-trading platform QUIK (Quik Broker,…

13 years ago

Anonymous #OpIsrael, use of botnets & hypothesis on attackers

We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last…

13 years ago

In the mind of cybercriminals – The Boston Marathon attack

To fight the cybercrime we must start thinking like criminals, they are people motivated solely by money and the need…

13 years ago

DHS alerted energy companies on ongoing spear-phishing campaign

Cyber espionage is considerable as  one of the most aggressive and dangerous cyber threats, its silent operation could steal sensitive…

13 years ago

Bitcoin in the storm and cybercrime try to take advantage of it

As can be imagined and anticipated the soar of Bicoin value has attracted the interest of cybercrime, recently we read of…

13 years ago

How cybercrime uses a compromised Skype account

In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as…

13 years ago

This website uses cookies.