botnet

Flashback botnet is still active, Mac users are warned

Intego Malware Research Team discovered that OSX Flashback trojan is still active with sinkholing activity. Mac users must be aware.…

12 years ago

Dexter Malware, the rise of malware that hits point of sales

Security experts at Arbor Networks have found a couple of servers used to arrange a malicious campaign against PoS with…

12 years ago

Cybercriminal threatens to sell 3.7M Customers data Israeli Banks

A group of hackers has threatened Israeli banks to disclose stolen data belonging 3.7 million customers unless the organizations pay…

12 years ago

ChewBacca, the last Tor-based banking trojan

Kaspersky Lab experts have discovered a new Tor-based banking trojan named "ChewBacca", it is the last malware exploiting Tor network.…

12 years ago

Website traffic report shows an increase of malicious bots activity

Incapula security firm published a new report on the analysis of website traffic evidencing the increment for malicious activities. Researchers…

12 years ago

ENISA Threat Landscape 2013 report, the rise of cyber threats

ENISA releases the ENISA Threat Landscape 2013, it a collection of information on top cyber-threats that have been assessed in…

12 years ago

Microsoft,Europol,FBI and partners decapitated ZeroAccess botnet

Microsoft Digital Crimes Unit, FBI, Europol and industry partners decapitated the feared ZeroAccess botnet that hijacks search results Microsoft this…

12 years ago

Two Million social media credentials stolen by cybercriminals

Two Million stolen Facebook, Twitter login credentials were found on 'Pony Botnet' Command and Control Server by Trustwave's researchers. Two…

12 years ago

i2Ninja – A new financial malware being sold on Russian underground

Trusteer researchers have uncovered a sneaky piece of financial malware, known as i2Ninja, being sold on a Russian cyber crime…

12 years ago

How to exploit iFramed based traffic E-shop for illegal activities

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible…

12 years ago

This website uses cookies.