You searched for: deep net

Connecting the Bots – Hancitor fuels Cuba Ransomware Operations

The Cuba Ransomware gang has partnered with the crooks behind the Hancitor malware in attacks aimed at corporate networks. The Hancitor downloader…

5 years ago

Purple Lambert, a new malware of CIA-linked Lambert APT group

Cybersecurity firm Kaspersky discovered a new strain of malware that is believed to be part of the arsenal of theUS…

5 years ago

Lazarus BTC Changer. Back in action with JS sniffers redesigned to steal crypto

Group-IB observed the North Korea-linked Lazarus APT group stealing cryptocurrency using a never-before-seen tool. In the last five years, JavaScript…

5 years ago

Personal data of 1.3 million Clubhouse users leaked online

An SQL database containing the personal data of 1.3 million Clubhouse users was leaked online for free, a few days…

5 years ago

Security Affairs newsletter Round 309

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

5 years ago

SAP systems are targeted within 72 hours after updates are released

On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm…

5 years ago

Security Affairs newsletter Round 308

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

5 years ago

Ubiquiti security breach may be a catastrophe

The data breach disclosed by Ubiquiti in January could be just the tip of the iceberg, a deeper incident could…

5 years ago

The surge of fake COVID-19 test results, vaccines and vaccination certificates on the Dark Web

Threat actors are offering fake COVID-19 test results and vaccination certificates in blackmarkets and hacking forums on the Dark Web.…

5 years ago

GoldMax, GoldFinder, and Sibot, 3 new malware used by SolarWinds attackers

Microsoft experts continue to investigate the SolarWinds attack and spotted 3 new strains of malware used as second-stage payloads. Microsoft…

5 years ago

This website uses cookies.