According to a report published by the Citizen Lab Iranian hackers have elaborated a sophisticated phishing scheme to takeover Gmail…
Symantec revealed the existence of 49 new modules of the Regin espionage platform, a circumstance that suggests that its operators…
The report Q2 2015 State of the Internet published by Akamai states that there has been a multiplying growth in…
A Study that will be presented at the USENIX Security Symposium shows that principal Dark marketplaces raked from $300,000 to…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
Security experts from Trend Micro have set up a number of honeypot to study the cyber attacks on vulnerable gas…
The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from…
Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The…
Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces.…
Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of…
This website uses cookies.