The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers cyber security a top priority alongside the resurgence of state-based threats (Russiaâs actions in Syria and Ukraine) and the terrorism (extremism and instability). When dealing with the impact of technology, especially cyber threats the report […]
Malware researchers from the MalwareHunterTeam have discovered a new strain of ransomware dubbed Popcorn Time on the Dark Web. Malware researchers from MalwareHunterTeam have spotted a new ransomware, dubbed Popcorn Time, that appears to be still under development. The researchers at MalwareHunterTeam found the Popcorn Time ransomware code on the Dark Web. This ransomware comes with […]
According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month. How much money earns a cyber criminal? According to a report published by the threat intelligence firm Recorded Future crooks earn between $1,000 and $3,000 a month, but one of five earns $20,000 a month or […]
A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code on Windows machines. The news is disconcerting and confirms the existence of a zero-day exploit in the wild that’s being used by threat actors to de-anonymize Tor users by executing malicious code on their machine. […]
Tor Project and Mozilla are working together to improve the security of Tor users and make harder for attackers to unmask them. Intelligence and law enforcement agencies continue to invest in order to de-anonymize Tor users. In the past, we received news about several techniques devised by various agencies to track Tor users, from the correlation attacks to the hack […]
The notorious hacker Peace_of_Mind has hacked and defaced the official hacking and trading forum w0rm.ws and doxed its alleged owners. ‘Peace_of_Mind‘ (PoM) is a very active actor in The Real Deal Market and The Hell black markets, he offered for sale the dumps from clamorous data breaches, including Yahoo, LinkedIn and MySpace The w0rm.ws a famous hacking platform, it is an âinvite onlyâ […]
Researchers devised two correlation attacks, dubbed DefecTor, to deanonymize Tor users using also data from observation of DNS traffic from Tor exit relays. Law enforcement and intelligence agencies dedicate an important commitment in the fight of illegal activities in the Dark Web where threat actors operate in a condition of pseudo-anonymity. A group of security researchers at […]
It’s a question of hours, security experts believe Yahoo will confirm the massive data breach that exposed at least 200 Million Yahoo accounts. Yahoo is ready to confirm a massive data breach that affected its service that has exposed several hundred million user accounts. “Yahoo is poised to confirm a massive data breach of its […]
Two researchers have analyzed images Exif metadata included in the photos used by crooks to advertise their products on black marketplaces in the dark web. Darknets are a privileged environment for crooks that intend to develop a prolific business protecting their anonymity, anyway, there are several aspects that they need to consider in order to […]
A few members of the community are calling for a ‘Tor general strike’ to protest against some decisions taken recently by the core members. Last month, the Tor Project announced that an internal investigation had confirmed the allegations of sexual misconduct against the notorious member Jacob Appelbaum. The allegations divided the internet privacy community, as a result of […]