Is it so easy to buy a weapon on the Dark Web? Access a dark net, buy a weapon, make a massacre. Is this the crime chain behind recent attacks? After mass shooting recently occurred in Germany the Dark Web monopolized the headlines. According to several German news outlets, the young man has bought the 9mm […]
O2 customer data that was reportedly first stolen from the gaming site XSplit in November 2013 are now offered for sale on the Dark Web. In the dark web it is possible to find any kind of illegal product and services, from weapons to payment card data, last disconcerting discovery is related to the availability of O2 customer data in the […]
David S., the Munich gunman has purchased the weapon on the Dark Web, sincerely I was waiting for this title in the headlines, but … In Germany, it is quite difficult to pay for weapons so how the Munich gunman got a 9mm Glock 17? According to several German news outlets, the young man has bought the 9mm […]
The security expert Brian Krebs investigated the links between the Carbanak cybercrime gang and the Infocube security firm. Today I want to share with you the findings of an investigation of the popular cyber security expert Brian Krebs. This time, Krebs investigated the link between a cybercrime gang and a security firm. The security company […]
The federal authorities have arrested the alleged mastermind behind KickassTorrents (KAT) and seized its domains, blocking its operations. According to the US Justice Department, the feds have arrested Artem Vaulin the alleged mastermind behind the BitTorrent distribution site KickassTorrents (KAT). The KickassTorrents website kat.cr is down worldwide and most of KAT domains (kickasstorrents.com, kickass.to, kat.ph, kastatic.com, thekat.tv, kat.cr, kickass.cr) […]
Recently, Reuters reported that the FBI sent an urgent confidential ‘Flash’ message to businesses and organizations to warn them about ransomware. Sponsored Content It is that dangerous. This is a new version of the ransom note, a form of malware that interferes with access to user files and data by encrypting it. Those running the […]
A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features. A recently discovered strain of ransomware, dubbed cuteRansomware, shows that your enterprise isn’t the only one thinking about cloud transition. Modern day hackers are loving the Cloud too. The cuteRansomware was discovered by Netskope security firm which observes an increase […]
A security expert revealed a number of flaws in the big player’s two-factor authentication methods that could allow crooks to steal money. Social media bug bounty hunter, Arne Swinnen, has revealed a number of flaws in the big player’s 2 factor authentication (2FA) methods that could enable a malicious user to illicit large sums of […]
Taiwanese law enforcement agencies are investigating malware-based attacks against ATMs of a national bank that resulted in a $2 million theft. Law enforcement in Taiwan investigating the attacks against ATMs of a major nations bank, the Taiwan’s First Bank. Crooks used a malware to withdraw more than $2 million from dozens of ATMs in the country, it […]
Operators behind the Neutrino EK have added the code to exploit an Internet Explorer flaw that was recently patched with the release of the MS16-053. Operators behind the infamous Neutrino EK have recently added the code to exploit an Internet Explorer vulnerability that was patched with the release of the MS16-053 security bulletin. The MS16-053 bulletin patched […]