botnet

New wave of DDoS against EU Banking can hide a sinister mysteryNew wave of DDoS against EU Banking can hide a sinister mystery

New wave of DDoS against EU Banking can hide a sinister mystery

In the last months of 2012 a group of hackers known as “Izz ad-Din al-Qassam Cyber Fighters” conducted a series…

12 years ago
HTTP-Botnets: The Dark Side of a Standard Protocol!HTTP-Botnets: The Dark Side of a Standard Protocol!

HTTP-Botnets: The Dark Side of a Standard Protocol!

When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the…

12 years ago
New dangerous threat Magic Malware hit thousands of UK firmsNew dangerous threat Magic Malware hit thousands of UK firms

New dangerous threat Magic Malware hit thousands of UK firms

The Internet is full of news regarding malware more or less sophisticated that are used for various purposes, cybercrime, cyber…

12 years ago
Bitcoin in the storm and cybercrime try to take advantage of itBitcoin in the storm and cybercrime try to take advantage of it

Bitcoin in the storm and cybercrime try to take advantage of it

As can be imagined and anticipated the soar of Bicoin value has attracted the interest of cybercrime, recently we read of…

12 years ago
WordPress sites under massive brute-force attackWordPress sites under massive brute-force attack

WordPress sites under massive brute-force attack

Any owner of WordPress site is shaking causes of the threat that someone could steal its credentials, everybody would do…

12 years ago
How cybercrime uses a compromised Skype accountHow cybercrime uses a compromised Skype account

How cybercrime uses a compromised Skype account

In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as…

12 years ago
Wandering in the underground, from exploit kits to hacking servicesWandering in the underground, from exploit kits to hacking services

Wandering in the underground, from exploit kits to hacking services

The cybercrime industry knows no crisis, new services are offered in the underground and criminals operating in different sectors are…

12 years ago
Botnet authors use Evernote account as C&C ServerBotnet authors use Evernote account as C&C Server

Botnet authors use Evernote account as C&C Server

Botnet author are increasing complexity of the malicious code they use and at the same time security firms are adopting more…

12 years ago
Rise of DIY, new botnet and keylogger generating tool in the wildRise of DIY, new botnet and keylogger generating tool in the wild

Rise of DIY, new botnet and keylogger generating tool in the wild

Not a day goes by that we're talking about powerful cyber attacks and the sensational cyber espionage campaigns, the dangerous…

12 years ago
From largest DDoS of ever vs Spamhaus a menace to global internetFrom largest DDoS of ever vs Spamhaus a menace to global internet

From largest DDoS of ever vs Spamhaus a menace to global internet

The news is circulating and this morning many colleagues called me to have more details on the event … what’s…

12 years ago