Botnets

Russian hacker HASH took control of a BBC serverRussian hacker HASH took control of a BBC server

Russian hacker HASH took control of a BBC server

The Russian hacker known as "HASH" and "Rev0lver" took control of a BBC server and attempted to sell access to…

11 years ago
Advanced Power hits Firefox Users to conduct vulnerability scanningAdvanced Power hits Firefox Users to conduct vulnerability scanning

Advanced Power hits Firefox Users to conduct vulnerability scanning

KrebsOnSecurity has discovered an unusual botnet that disguises itself as a legitimate add-on for Mozilla Firefox to perform website vulnerability…

11 years ago
New crimekit Atrax exploits Tor, mines Bitcoin and much moreNew crimekit Atrax exploits Tor, mines Bitcoin and much more

New crimekit Atrax exploits Tor, mines Bitcoin and much more

Atrax, yet another commercial crimekit on the black market, a malware able to exploit Tor and that implements numerous features…

11 years ago
Profiling for underground service harvests mobile phone numbersProfiling for underground service harvests mobile phone numbers

Profiling for underground service harvests mobile phone numbers

Dancho Danchev profiled a new service harvests mobile phone numbers advertised in the underground, the vendor also proposing SMS spamming…

12 years ago
The cybercrime ecosystem, resources,motivations and methodsThe cybercrime ecosystem, resources,motivations and methods

The cybercrime ecosystem, resources,motivations and methods

Information provided by the results of principal researches on the cybercrime reveals resources,motivations and methods and cost illegal operations. Fortinet…

12 years ago
Android botnets on the rise – case studyAndroid botnets on the rise – case study

Android botnets on the rise – case study

Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and…

12 years ago
The business behind a cashout service for cybercriminalsThe business behind a cashout service for cybercriminals

The business behind a cashout service for cybercriminals

An interesting post by Brian Krebs is food for thought on the business behind a cashout service for cybercriminals. Brian…

12 years ago
WSIS Forum 2013 – Securing Cyberspace in a borderless worldWSIS Forum 2013 – Securing Cyberspace in a borderless world

WSIS Forum 2013 – Securing Cyberspace in a borderless world

“Securing Cyberspace in a borderless world: Vision 2015 and Beyond” is the title of a High Level Dialogue that was…

12 years ago
Hacking with new DIY Google Dorks based hacking toolHacking with new DIY Google Dorks based hacking tool

Hacking with new DIY Google Dorks based hacking tool

A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for…

12 years ago
DDoS – Evolution of DIY tools in the undergroundDDoS – Evolution of DIY tools in the underground

DDoS – Evolution of DIY tools in the underground

When the DDoS topic is introduced it's immediate to link it with the most popular tools usable for this type…

12 years ago