botnet

Two-factor Authentication for SMBs

The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods…

13 years ago

Self-propagating ZeuS source code offered for sale in the underground

A new variant of Zeus trojan is offered for sale in the underground. It is a Self-propagating version that exploits…

13 years ago

Attacks-as-a-Service, MaaS, FaaS different terms same success history

Attacks-as-a-Service, Malware-as-a-Service and Fraud-as-a-Service, are all terms used to better qualify the complex evolution of cybercrime offer. Attacks-as-a-Service , Malware-as-a-Service and Fraud-as-a-Service are all terms commonly used for…

13 years ago

Profiling the offer in criminal underground

Periodic analysis of the evolution of the offer in the underground criminal thanks to the efforts of experts such as…

13 years ago

Drupal data breach exposes data of 1 million users

Drupal data breach - The Drupal Association with an official notice revealed that Drupal was hit by a large-scale data…

13 years ago

Group-IB Exclusive details on Kangoo botnet that hit Australian banks

Group-IB researchers have detected a new botnet named Kangoo that infected more than 150 000 machines mainly targeting Australian banks.…

13 years ago

New trends in the underground market, the offer of cybercrime

The monitoring of the criminal underground is essential to understand the dynamics of cybercrime and related offer on the black market.…

13 years ago

The offensive approach to cybersecurity, motivations and risks

Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to…

13 years ago

ESET on Avatar rootkit with API, SDK, and Yahoo Groups as C&C

ESET security firm found a mysterious instance of Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication Early…

13 years ago

FireEye report on advanced cyber attacks landscape

FireEye report on the evolution of sophisticated cyber threats and their diffusion on global scale FireEye security firm has published another interesting report,…

13 years ago

This website uses cookies.