Lotus Blossom Chinese cyberspies leverage on fake Conference Invites in the last campaign

9 years ago

The Chinese APT Lotus Blossom is trying to lure victims with fake invitations to Palo Alto Networks’ upcoming Cybersecurity Summit.…

Massive hacking campaign on Joomla sites via recently patched flaws

9 years ago

Experts from the firm Sucuri observed a spike in the number of attacks in less than 24 hours after Joomla…

Young hacker arrested for disrupting 911 Service with a TDoS attack

9 years ago

An 18-year-old man from Arizona, Meetkumar Hiteshbhai Desai, was arrested this week because he is suspected for the severe disruption…

Crooks earned at least $1.35m with spamming campaigns

9 years ago

Authorities identified a man in Florida that powered spamming campaigns abusing an army of corporate servers and private email accounts.…

AV-TEST study sees search engine results even more poisoned with malicious links

9 years ago

According to a study published by the independent anti-virus testing outfit AV-TEST, the number of malicious search engine results has…

Security Affairs newsletter Round 84 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

LDAP as attack vector could power Terabit-Scale LDAP DDoS Attacks

9 years ago

Security experts observed attackers launching a powerful LDAP DDoS, the new amplification method could peak Terabit-Scale attacks. LDAP DDoS attacks…

Exclusive: MalwareMustDie spotted a new IoT Linux/IRCTelnet malware made in Italy

9 years ago

Exclusive: The security researcher MalwareMustDie has found a new Linux/IRCTelnet malware- made in Italy - that aims IoT botnet connected…

Red Cross Blood Service incident. The Australian largest ever leak of Personal data

9 years ago

The Australian Red Cross Blood Service confirmed the data leak that exposed a backup database containing the personal details of…

Hacking back the Mirai botnet, technical and legal issues

9 years ago

Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back…

This website uses cookies.