Cryptocurrency mining operations target Windows Server, Redis and Apache Solr servers online

8 years ago

Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns targeting Windows Server, Redis and Apache…

Security Affairs newsletter Round 153 – News of the week

8 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again…

Hacking Team is back … probably it never stopped its activity. Watch Out!

8 years ago

ESET collected evidence of Hacking Team 'activity post-hack, the company published an interesting analysis based on post hack samples found…

Governments rely on Sandvine network gear to deliver spyware and miners

8 years ago

According to Citizen Lab, some governments are using Sandvine network gear installed at internet service providers to deliver spyware and…

Sophisticated APT group compromised routers to deliver Slingshot Spyware

8 years ago

Slingshot spyware - Security researchers at Kaspersky have spotted a new sophisticated APT group that has been operating under the…

North Korean Hidden Cobra APT targets Turkish financial industry with new Bankshot malware

8 years ago

McAfee Advanced Threat Research team discovered that the Hidden Cobra APT group is targeting financial organizations in Turkey. North Korea-linked…

Russian hackers stole 860,000 euros from 32 ATMs belonging to the Raiffeisen Romania in just one night

8 years ago

In just one night a Russian crime gang stole 3.8 million slopes (860,000 euros) from 32 ATMs belonging to the…

Dofoil Trojan used to deploy cryptocurrency miner on more than 500,000 PCs in a few hours

8 years ago

Microsoft experts observed more than more than 500,000 computers infected with Dofoil Trojan used to download a cryptocurrency miner. A few…

CIGslip attack could allow hacker to bypass Microsoft Code Integrity Guard

8 years ago

Security experts devised a stealth attack technique dubbed CIGslip that could be exploited by attackers to bypass Microsoft Code Integrity Guard…

Olympic Destroyer, alleged artifacts and false flag make attribution impossible

8 years ago

  According to Kaspersky Lab, threat actors behind the recent Olympic Destroyer attack planted sophisticated false flags inside their malicious…

This website uses cookies.