Cybercrime

Crooks hijack Magento Realex Payments extension to steal payment card data

Cybercriminals hijack Magento Realex Payments extension to steal payment card data. Experts at Sucuri are observing massive attacks. Cybercriminals continue to…

9 years ago

New variant of the macOS Proton RAT advertised on Russian cybercrime underground

Experts from security firm Sixgill have discovered a new strain of the macOS Proton RAT that is offered for sale…

9 years ago

Ennetcom – Dutch Police confirmed to have decrypted BlackBerry PGP messages in a criminal case

The Dutch police decrypted a number of PGP messages sent by crooks through their BlackBerry mobile devices for the criminal…

9 years ago

The total potential loss for financial services globally is estimated at £8 billion

Researchers at ThreatMetrix observed that online financial services and lending companies were the most targeted by crooks in 2016. Online…

9 years ago

Exclusive: A criminal group using SSH TCP direct forward attack is also targeting Italian infrastructure

Exclusive: MalwareMustDie for Security Affairs released the list of the sites under attack. A criminal gang is using SSH TCP…

9 years ago

Trolling, Doxing & Cyberstalking: Cybercrime & The Law

Trolling, Doxing & Cyberstalking: Cybercrime & The Law. Cybercrime is one of the greatest threats facing US with implications for…

9 years ago

Alleged Master Keys for the Dharma Ransomware Leaked on BleepingComputer

Good news for the victims of the Dharma Ransomware, someone has released the alleged Master Keys on the BleepingComputer.com forums.…

9 years ago

Phishing Trends Report – 2016 ended as the worst year for phishing in history

The Anti-Phishing Working Group (APWG) published the Phishing Trends Report for Q4 2016. APWG reported 1.2 million phishing attacks in…

9 years ago

The Necurs botnet is evolving, now includes a DDoS module

The Necurs botnet is evolving and recently the experts at BitSight’s Anubis Labs discovered that it was improved to launch…

9 years ago

Stolen EHR data is flooding criminal underground communities in the Deep Web

EHR data are precious commodities in the cyber criminal underground because of the lack of cyber security of healthcare industry.…

9 years ago

This website uses cookies.