Reports

Reading the Yoroi Cyber Security Annual Report 2018Reading the Yoroi Cyber Security Annual Report 2018

Reading the Yoroi Cyber Security Annual Report 2018

Yoroi Cyber Security Annual Report 2018 - In 2018 cyber-security experts observed an increased number of cyber attacks, malware endure…

6 years ago
DHS and FBI published a Malware Analysis Report on North Korea-linked tool ELECTRICFISHDHS and FBI published a Malware Analysis Report on North Korea-linked tool ELECTRICFISH

DHS and FBI published a Malware Analysis Report on North Korea-linked tool ELECTRICFISH

The U.S. Department of Homeland Security (DHS) and the FCI published a new joint report on ELECTRICFISH, a malware used…

6 years ago
MIVD Dutch intelligence warns of Russian, Chinese cyber espionageMIVD Dutch intelligence warns of Russian, Chinese cyber espionage

MIVD Dutch intelligence warns of Russian, Chinese cyber espionage

The Military Intelligence and Security Service (MIVD) warn of "worrying" cyber espionage activities carried out by Russia and China. The…

6 years ago
Over 23 million breached accounts were using ‘123456’ as passwordOver 23 million breached accounts were using ‘123456’ as password

Over 23 million breached accounts were using ‘123456’ as password

A cyber survey conducted by the United Kingdom’s National Cyber Security Centre (NCSC) revealed that '123456' is still the most…

6 years ago
Russian TA505 threat actor target financial entities worldwideRussian TA505 threat actor target financial entities worldwide

Russian TA505 threat actor target financial entities worldwide

Russian financially motivated threat actor TA505 used remote access Trojans (RATs) in attacks on financial entities in the United States…

6 years ago
FBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APTFBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APT

FBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APT

According to a joint report published by the United States Department of Homeland Security (DHS) and Federal Bureau of Investigation…

6 years ago
Experts observed the growth of hi-tech crime landscape in Asia in 2018Experts observed the growth of hi-tech crime landscape in Asia in 2018

Experts observed the growth of hi-tech crime landscape in Asia in 2018

Security experts at Group-IB presented at Money2020 Asia the results of an interesting analysis of hi-tech crime landscape in Asia…

6 years ago
Torrent Risks: How to get infected through torrent with a good reputationTorrent Risks: How to get infected through torrent with a good reputation

Torrent Risks: How to get infected through torrent with a good reputation

Experts at Z-Lab Yoroi/Cybaze have conducted an interesting analysis on the risks for users downloading films, games, and software through…

6 years ago
2 HackerOne members received each over $1M via Bug programs2 HackerOne members received each over $1M via Bug programs

2 HackerOne members received each over $1M via Bug programs

Bug bounty platform HackerOne announced that two of its members have each earned more than $1 million by participating bug…

6 years ago
Crooks offer millions to skilled black hats to help them in extortion campaignsCrooks offer millions to skilled black hats to help them in extortion campaigns

Crooks offer millions to skilled black hats to help them in extortion campaigns

Cybercriminals are offering over a million dollars per year to skilled professionals like vxers and penetration testers to help them…

6 years ago