Dogspectus ransomware campaign relies on Leaked Hacking Team Exploits and Towelroot

10 years ago

Blue Coat spotted a new ransomware-based campaign serving the Dogspectus malware. Crooks combined a Hacking Team exploit and the Towelroot…

GozNym Trojan even more sophisticated with a singular redirection mechanism

10 years ago

The cybercriminals behind the GozNym Trojan have started targeting users in European countries with a new singular redirection mechanism. Last…

Bangladesh Bank heist gang used a malware and could strike again

10 years ago

A report published by the BAE firm reveals that criminals who stole $101 million from Bangladesh bank used a malware…

Faster Internet Adware silently takes screenshot of your PC

10 years ago

Security Experts at Bleeping Computer have discovered a new adware dubbed Faster Internet that takes a screenshot of victims' computers.…

Bogus social button plugin redirects to Angler Exploit Kit

10 years ago

Experts at Malwarebytes observed a new attack pattern that relies on fake social button plugin that redirects visitors to Angler…

The US Cyber Command started the attacks on the Islamic State

10 years ago

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the…

DARPA calls for a hacker-proof encryption App, and it will pay it

10 years ago

The Defense Advanced Research Projects Agency is calling for the development of a hacker-proof encryption App for the U.S. military.…

Dutch police seize the Ennetcom encrypted communication network

10 years ago

The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users.…

Security Affairs newsletter Round 57 – News of the week

10 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs American company…

Snap packaging could reveal private data in Ubuntu 16.04 version

10 years ago

A feature in the Ubuntu 16.04 version could be abused to expose users private data posing a serious threat to…

This website uses cookies.