You searched for: Bitcoin

CSTO Ransomware, a malware that uses UDP and Google MapsCSTO Ransomware, a malware that uses UDP and Google Maps

CSTO Ransomware, a malware that uses UDP and Google Maps

CSTO ransomware it is able to query the Google Maps API to discover the victim's location and connects to the…

9 years ago
Security Affairs newsletter Round 76 – News of the weekSecurity Affairs newsletter Round 76 – News of the week

Security Affairs newsletter Round 76 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago
Security Affairs newsletter Round 75 – News of the weekSecurity Affairs newsletter Round 75 – News of the week

Security Affairs newsletter Round 75 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago
Cisco Updates ASA Software to fix the Equation Group’s EXTRABACON exploitCisco Updates ASA Software to fix the Equation Group’s EXTRABACON exploit

Cisco Updates ASA Software to fix the Equation Group’s EXTRABACON exploit

Cisco has started releasing patches for its ASA software to address the Equation Group's EXTRABACON exploit included in the NSA…

9 years ago
The Equation Group’s exploit ExtraBacon works on newer Cisco ASAThe Equation Group’s exploit ExtraBacon works on newer Cisco ASA

The Equation Group’s exploit ExtraBacon works on newer Cisco ASA

Security experts have improved the ExtraBacon exploit included in the NSA Equation Group arsenal to hack newer version of CISCO…

9 years ago
Europol Operation Daylight, arrested 75 suspects for sharing child sex imagesEuropol Operation Daylight, arrested 75 suspects for sharing child sex images

Europol Operation Daylight, arrested 75 suspects for sharing child sex images

The Europol coordinated the Operation Daylight against criminals that were sharing child sex images on the internet, 75 suspects have…

9 years ago
Linux.Rex.1, a new Linux Trojan the creates a P2P BotnetLinux.Rex.1, a new Linux Trojan the creates a P2P Botnet

Linux.Rex.1, a new Linux Trojan the creates a P2P Botnet

Security researchers discovered a new Linux Trojan dubbed Linux.Rex.1 that is capable of self-spreading and create a peer-to-peer botnet. A…

9 years ago
Security Affairs newsletter Round 74 – News of the weekSecurity Affairs newsletter Round 74 – News of the week

Security Affairs newsletter Round 74 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago
The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in…

9 years ago
Hacker Interviews – Dêfãult Vírüsa (@_d3f4ult)Hacker Interviews – Dêfãult Vírüsa (@_d3f4ult)

Hacker Interviews – Dêfãult Vírüsa (@_d3f4ult)

Dear Readers, today I want to present you Dêfãult Vírüsa one of the most intriguing hackers on the Internet. He…

9 years ago