Cybercrime

CryPy ransomware uses a unique Key for each encrypted file

Experts from Kaspersky have spotted a new threat in the wild written in Python, the CryPy ransomware that uses a…

9 years ago

The Mirai botnet is targeting also Sierra Wireless cellular data gear products

Sierra Wireless is warning its customers to change factory credentials of its AireLink gateway communications products due to Mirai attacks.…

9 years ago

Android Acecard banking trojan asks users for selfie with an ID card

Experts discovered a new variant of the Android Acecard banking trojan that asks victims to take a selfie while they…

9 years ago

Exclusive – ELF Linux/NyaDrop, a new IoT threat in the wild

Exclusive: interview made by @unixfreaxjp of MalwareMustDie for Security Affairs about the Linux/NyaDrop. The latest details about this new dangerous…

9 years ago

Attackers are exploiting a recently patched high-severity DoS flaw in BIND

Attackers are exploiting a recently patched high-severity DoS flaw, tracked as CVE-2016-2776, in the in the popular DNS software in…

9 years ago

Bitcoin Wallet Blockchain.info went down due to a DNS Hijacking

 Blockchain.info, the world's most popular Bitcoin wallet and Block Explorer service went down this week due to a DNS Hijacking…

9 years ago

Vera Bradley retail chain notifies customers of data breach

The American retail chain Vera Bradley announced that hackers have stolen a yet undetermined number of payment card data from…

9 years ago

Experts observed several malvertising campaigns deliver Cerber 4.0

Cerber 4.0 is the latest variant of the Cerber ransomware family that is becoming even more common in the malvertising…

9 years ago

DXXD Ransomware, displays legal notice and encrypts files on unmapped network shares

The DXXD ransomware specifically targets servers and is able to encrypt files on network shares even if they haven’t been…

9 years ago

Inside the DDoS attacks powered by large IoT botnets

Cloudflare firm has published a report that analyzes two recent attacks that were powered by large IoT botnets based on…

9 years ago

This website uses cookies.