Attacks-as-a-Service, Malware-as-a-Service and Fraud-as-a-Service, are all terms used to better qualify the complex evolution of cybercrime offer. Attacks-as-a-Service , Malware-as-a-Service and Fraud-as-a-Service are all terms commonly used for…
Periodic analysis of the evolution of the offer in the underground criminal thanks to the efforts of experts such as…
Drupal data breach - The Drupal Association with an official notice revealed that Drupal was hit by a large-scale data…
Group-IB researchers have detected a new botnet named Kangoo that infected more than 150 000 machines mainly targeting Australian banks.…
The monitoring of the criminal underground is essential to understand the dynamics of cybercrime and related offer on the black market.…
Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to…
ESET security firm found a mysterious instance of Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication Early…
FireEye report on the evolution of sophisticated cyber threats and their diffusion on global scale FireEye security firm has published another interesting report,…
In the last months of 2012 a group of hackers known as “Izz ad-Din al-Qassam Cyber Fighters” conducted a series…
When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the…
This website uses cookies.