Reports

Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud accountMan-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The…

10 years ago
Interpol is training Police officers to fight crime on the DarknetInterpol is training Police officers to fight crime on the Darknet

Interpol is training Police officers to fight crime on the Darknet

Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces.…

10 years ago
APT 29 use Twitter to control its Hammertoss data stealerAPT 29 use Twitter to control its Hammertoss data stealer

APT 29 use Twitter to control its Hammertoss data stealer

Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of…

10 years ago
Advertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a dayAdvertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a day

Advertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a day

Mobile Malware is growing and crooks are targeting the advertising industry to redirect users to ad pages in a sort…

10 years ago
FireEye report on TTPs of Nigerian a 419 scammers groupFireEye report on TTPs of Nigerian a 419 scammers group

FireEye report on TTPs of Nigerian a 419 scammers group

FireEye published a report on the operations of a group of 419 scammers located in Nigeria, which is using malware as a component…

10 years ago
Security Affairs newsletter Round 19 – Best of the week from best sourcesSecurity Affairs newsletter Round 19 – Best of the week from best sources

Security Affairs newsletter Round 19 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago
All Smartwatches on the market are vulnerable to attacksAll Smartwatches on the market are vulnerable to attacks

All Smartwatches on the market are vulnerable to attacks

A study conducted by HP's Fortify on security features implemented by Smartwatches revealed that not even a single device found…

10 years ago
Business Blackout, economic impact of a cyber attack against a power gridBusiness Blackout, economic impact of a cyber attack against a power grid

Business Blackout, economic impact of a cyber attack against a power grid

What will happen if hackers will hit critical infrastructure in the US, which will be the economic impact of a…

10 years ago
Incidents at Federal Government Agencies increased more than 1,000 percent since 2006Incidents at Federal Government Agencies increased more than 1,000 percent since 2006

Incidents at Federal Government Agencies increased more than 1,000 percent since 2006

According to a new report by the Government Accountability Office (GAO), The Federal Government needs for stronger controls across Federal…

10 years ago
A former intern at FireEye accused for Dendroid RAT developingA former intern at FireEye accused for Dendroid RAT developing

A former intern at FireEye accused for Dendroid RAT developing

A former intern at FireEye firm has been arrested for developing and distributing the sophisticated Android malware dubbed Dendroid. A…

10 years ago