You searched for: Bitcoin

Four individuals charged for the recent Twitter hack

Four suspects were charged for their alleged involvement in the recent Twitter hack, announced the Department of Justice. US authorities…

6 years ago

Twitter revealed that hackers accessed DM Inboxes in July attack

Twitter confirmed that hackers accessed the direct message (DM) inboxes of some of the accounts that were recently compromised. Last…

6 years ago

Prometei, a new modular crypto-mining botnet exploits Windows SMB

Prometei is a crypto-mining botnet that recently appeared in the threat landscape, it exploits the Microsoft Windows SMB protocol for…

6 years ago

Tedrade banking malware families target users worldwide

The Tetrade term coined by Kaspersky experts to refer four large banking trojan families developed and spread by Brazilian crooks worldwide. Cybersecurity…

6 years ago

Twitter reveals that hackers also downloaded data from eight compromised accounts

The social media giant Twitter confirmed that hackers compromised 130 accounts in last week hack and downloaded data from eight…

6 years ago

Security Affairs newsletter Round 273

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

6 years ago

Security Affairs newsletter Round 271

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

6 years ago

Hackers are targeting unsecured MongoDB database

A new wave of attacks is targeting unsecured MongoDB database servers and wiping their content attempting to extort a ransom…

6 years ago

New Zealand freezes assets of Russian cyber criminal Alexander Vinnik

New Zealand police had frozen NZ$140 million (US$90 million) in assets linked to a Russian cyber criminal. New Zealand police…

6 years ago

Black Kingdom ransomware operators exploit Pulse VPN flaws

Black Kingdom ransomware operators are targeting organizations using unpatched Pulse Secure VPN software to deploy their malware. Researchers from security…

6 years ago

This website uses cookies.