Botnets

Russian hacker HASH took control of a BBC server

The Russian hacker known as "HASH" and "Rev0lver" took control of a BBC server and attempted to sell access to…

10 years ago

Advanced Power hits Firefox Users to conduct vulnerability scanning

KrebsOnSecurity has discovered an unusual botnet that disguises itself as a legitimate add-on for Mozilla Firefox to perform website vulnerability…

10 years ago

New crimekit Atrax exploits Tor, mines Bitcoin and much more

Atrax, yet another commercial crimekit on the black market, a malware able to exploit Tor and that implements numerous features…

10 years ago

Profiling for underground service harvests mobile phone numbers

Dancho Danchev profiled a new service harvests mobile phone numbers advertised in the underground, the vendor also proposing SMS spamming…

11 years ago

The cybercrime ecosystem, resources,motivations and methods

Information provided by the results of principal researches on the cybercrime reveals resources,motivations and methods and cost illegal operations. Fortinet…

11 years ago

Android botnets on the rise – case study

Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and…

11 years ago

The business behind a cashout service for cybercriminals

An interesting post by Brian Krebs is food for thought on the business behind a cashout service for cybercriminals. Brian…

11 years ago

WSIS Forum 2013 – Securing Cyberspace in a borderless world

“Securing Cyberspace in a borderless world: Vision 2015 and Beyond” is the title of a High Level Dialogue that was…

11 years ago

Hacking with new DIY Google Dorks based hacking tool

A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for…

11 years ago

DDoS – Evolution of DIY tools in the underground

When the DDoS topic is introduced it's immediate to link it with the most popular tools usable for this type…

11 years ago

This website uses cookies.