Sophisticated APT group compromised routers to deliver Slingshot Spyware

8 years ago

Slingshot spyware - Security researchers at Kaspersky have spotted a new sophisticated APT group that has been operating under the…

North Korean Hidden Cobra APT targets Turkish financial industry with new Bankshot malware

8 years ago

McAfee Advanced Threat Research team discovered that the Hidden Cobra APT group is targeting financial organizations in Turkey. North Korea-linked…

Russian hackers stole 860,000 euros from 32 ATMs belonging to the Raiffeisen Romania in just one night

8 years ago

In just one night a Russian crime gang stole 3.8 million slopes (860,000 euros) from 32 ATMs belonging to the…

Dofoil Trojan used to deploy cryptocurrency miner on more than 500,000 PCs in a few hours

8 years ago

Microsoft experts observed more than more than 500,000 computers infected with Dofoil Trojan used to download a cryptocurrency miner. A few…

CIGslip attack could allow hacker to bypass Microsoft Code Integrity Guard

8 years ago

Security experts devised a stealth attack technique dubbed CIGslip that could be exploited by attackers to bypass Microsoft Code Integrity Guard…

Olympic Destroyer, alleged artifacts and false flag make attribution impossible

8 years ago

  According to Kaspersky Lab, threat actors behind the recent Olympic Destroyer attack planted sophisticated false flags inside their malicious…

Group-IB supported law enforcement in dismantling Ukrainian DDoS crime gang

8 years ago

Ukrainian Police supported by security firm Group-IB and other security firms dismantled a DDoS crime gang that blackmailed numerous companies…

Hardcoded password and Java deserialization flaws found in Cisco products

8 years ago

The set of security updates recently released by Cisco also includes two advisories for critical vulnerabilities, a hardcoded password, and…

Leaked NSA dump contains tools developed by NSA Territorial Dispute to track state-sponsored hackers

8 years ago

A specific NSA unit, dubbed NSA Territorial Dispute (TeDi) developed these scripts to monitor activities of nation-state actors. Security experts at CrySyS…

Corero Network discovered a Kill Switch for Memcached DDoS attacks

8 years ago

Corero network security discovers a “kill switch” for memcached DDoS attacks and also reveals memcached exploit can be used to…

This website uses cookies.