Deep Web

The Nuke HTTP bot Malware offered for sale on a Dark Web forum

The security researchers at security firm Sixgill discovered a new malware dubbed Nuke HTTP bot offered for sale on a…

7 years ago

UK National Security Strategy, Cyber Security is a top priority

The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers…

7 years ago

Popcorn Time ransomware, pay up the ransom or spread it to decrypt the files

Malware researchers from the MalwareHunterTeam have discovered a new strain of ransomware dubbed Popcorn Time on the Dark Web. Malware…

7 years ago

How much money earns cybercriminals? Mostly from $1,000 to $3,000, but …

According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month.…

7 years ago

The code of a Firefox Zero-Day Exploit used to unmask Tor Users is online

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code…

7 years ago

Here’s how Tor Project and Mozilla will make harder de-anonymizing Tor users

Tor Project and Mozilla are working together to improve the security of Tor users and make harder for attackers to…

8 years ago

Peace_of_Mind hacked the hacking forum w0rm_ws and doxed its alleged owner

The notorious hacker Peace_of_Mind has hacked and defaced the official hacking and trading forum w0rm.ws and doxed its alleged owners. 'Peace_of_Mind' (PoM) is a…

8 years ago

DefecTor – Deanonymizing Tor users with the analysis of DNS traffic from Tor exit relays

Researchers devised two correlation attacks, dubbed DefecTor, to deanonymize Tor users using also data from observation of DNS traffic from…

8 years ago

Yahoo is going to confirm the data breach that exposed 200 Million Yahoo accounts

It's a question of hours, security experts believe Yahoo will confirm the massive data breach that exposed at least 200…

8 years ago

Boffins analyzed EXIF metadata in photos on principal blackmarkets

Two researchers have analyzed images Exif metadata included in the photos used by crooks to advertise their products on black…

8 years ago

This website uses cookies.