You searched for: Bitcoin

Mamba: The new Full Disk Encryption Ransomware Family Member

A Brazilian Infosec research group, Morphus Labs, just discovered a new Full Disk Encryption (FDE) Ransomware this week, dubbed Mamba.…

9 years ago

A look into French underground from pen guns and euthanasia kits

"The French Underground: Under a Shroud of Extreme Caution", another interesting report published by Trend Micro on illegal activities in…

9 years ago

GovRAT 2.0 continues to target US companies and Government

Vxers developed a new version of GovRAT, called GovRAT, that has been used to target government and many other organizations…

9 years ago

CSTO Ransomware, a malware that uses UDP and Google Maps

CSTO ransomware it is able to query the Google Maps API to discover the victim's location and connects to the…

9 years ago

Security Affairs newsletter Round 76 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago

Security Affairs newsletter Round 75 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago

Cisco Updates ASA Software to fix the Equation Group’s EXTRABACON exploit

Cisco has started releasing patches for its ASA software to address the Equation Group's EXTRABACON exploit included in the NSA…

9 years ago

The Equation Group’s exploit ExtraBacon works on newer Cisco ASA

Security experts have improved the ExtraBacon exploit included in the NSA Equation Group arsenal to hack newer version of CISCO…

9 years ago

Europol Operation Daylight, arrested 75 suspects for sharing child sex images

The Europol coordinated the Operation Daylight against criminals that were sharing child sex images on the internet, 75 suspects have…

9 years ago

Linux.Rex.1, a new Linux Trojan the creates a P2P Botnet

Security researchers discovered a new Linux Trojan dubbed Linux.Rex.1 that is capable of self-spreading and create a peer-to-peer botnet. A…

9 years ago

This website uses cookies.