Cyber security expert Dancho Danchev profiled a new OPSEC training services in the underground, a new trend that is converging…
Kaspersky Lab experts have discovered a new Tor-based banking trojan named "ChewBacca", it is the last malware exploiting Tor network.…
ENISA releases the ENISA Threat Landscape 2013, it a collection of information on top cyber-threats that have been assessed in…
Researchers at ReVuln demonstrated how gain the control of an entire render farm exploiting the vulnerability affecting NVIDIA mental ray.…
Cryptolocker is considered one of most insidious threat for Internet users, a recent spam campaign targeted 10M UK Users, let's…
A new version of the popular black market Silk Road has been launched, the greatest illegal marketplace on Tor network…
What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible…
FBI seizes underground drug market Silk Road and identified its owner. The site was producing earning for more than $1.2…
IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on Java exploits, mobile threats, Bitcoin mining,…
An identity theft service that sells personal information on millions of US citizens has been hacked. Millions of US citizens…
This website uses cookies.