botnet

Two Million social media credentials stolen by cybercriminalsTwo Million social media credentials stolen by cybercriminals

Two Million social media credentials stolen by cybercriminals

Two Million stolen Facebook, Twitter login credentials were found on 'Pony Botnet' Command and Control Server by Trustwave's researchers. Two…

12 years ago
i2Ninja – A new financial malware being sold on Russian undergroundi2Ninja – A new financial malware being sold on Russian underground

i2Ninja – A new financial malware being sold on Russian underground

Trusteer researchers have uncovered a sneaky piece of financial malware, known as i2Ninja, being sold on a Russian cyber crime…

12 years ago
How to exploit iFramed based traffic E-shop for illegal activitiesHow to exploit iFramed based traffic E-shop for illegal activities

How to exploit iFramed based traffic E-shop for illegal activities

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible…

12 years ago
Criminals hacked illegal service exposing Americans to Identity theftCriminals hacked illegal service exposing Americans to Identity theft

Criminals hacked illegal service exposing Americans to Identity theft

An identity theft service that sells personal information on millions of US citizens has been hacked. Millions of US citizens…

12 years ago
Thousands of hacked WordPress sites used in global scale attacksThousands of hacked WordPress sites used in global scale attacks

Thousands of hacked WordPress sites used in global scale attacks

Thousands of Wordpress based websites have been hacked to compose a global scale botnet that is performing powerful DDOS attacks. I start…

12 years ago
No good news from ENISA Threat Landscape Mid year 2013No good news from ENISA Threat Landscape Mid year 2013

No good news from ENISA Threat Landscape Mid year 2013

ENISA Threat Landscape Mid year 2013 presents top cyber threats, anticipating its interim Threat Landscape 2013 report. The study reveals…

12 years ago
A look to Android offer in the underground mobile marketA look to Android offer in the underground mobile market

A look to Android offer in the underground mobile market

Security experts continues to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile…

12 years ago
Mevade botnet responsible for the spike in Tor trafficMevade botnet responsible for the spike in Tor traffic

Mevade botnet responsible for the spike in Tor traffic

Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in…

12 years ago
DDoS to hide attacks against wire payment switch systemsDDoS to hide attacks against wire payment switch systems

DDoS to hide attacks against wire payment switch systems

Fraudsters target wire payment switch at US banks to steal millions using DDoS to divert the attention on fraudulent transactions. Cybercriminals are…

12 years ago
Fort Disco botnet compromised more than 6000 websitesFort Disco botnet compromised more than 6000 websites

Fort Disco botnet compromised more than 6000 websites

Researchers at Arbor Networks discovered a botnet called Fort Disco that was used to compromise more than 6000 websites based on…

12 years ago