You searched for: Bitcoin

New wave of DDoS against EU Banking can hide a sinister mystery

In the last months of 2012 a group of hackers known as “Izz ad-Din al-Qassam Cyber Fighters” conducted a series…

13 years ago

In the mind of cybercriminals – The Boston Marathon attack

To fight the cybercrime we must start thinking like criminals, they are people motivated solely by money and the need…

13 years ago

DHS alerted energy companies on ongoing spear-phishing campaign

Cyber espionage is considerable as  one of the most aggressive and dangerous cyber threats, its silent operation could steal sensitive…

13 years ago

Winnti – a cyber espionage case for gaming industry

Another cyber espionage campaign has been discovered by Kaspersky Lab Team, I start to get the feeling that whatever is…

13 years ago

How cybercrime uses a compromised Skype account

In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as…

13 years ago

The offer of Russian underground for phishing campaigns

Russian underground is considered one of the most prolific black market, it provides various services that allow cybercriminals to arrange…

13 years ago

The “company” cybercrime seen by Fortinet

Fortinet company, the worldwide provider of network security appliances and a market leader in unified threat management (UTM), has recently…

13 years ago

How to get into your house through SmartTV

It's time of analysis for the past year and forecasts on what will be the main cyber threats for next…

13 years ago

Skynet, the potential use of Tor as a bulletproof botnet

On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet…

13 years ago

The Deep Dark Web Book Released

After much work during the last months I'm proud and happpy to announce the publishing of The Deep Dark Web…

13 years ago

This website uses cookies.