Cybercrime

How to defeat every ransomware with Crypto Drop

A group of American boffins have devised a system dubbed Crypto Drop that working with a “save what you can”…

10 years ago

JIGSAW ransomware defeated once again, decrypt your files for free

If you are one of the victims of the Jigsaw ransomware there is a good news for you, experts from…

10 years ago

The hidden link between the Angler EK drop and the Lurk gang

Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against…

10 years ago

Be careful backdoored Pokemon GO Android App spotted in the wild

ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers…

10 years ago

Netia SA, the second telecom company hacked by a Ukrainian hacker

A Ukrainian Hacker has breached the servers of the Polish Telecom Company Netia SA and leaked on an underground forum…

10 years ago

New Locky variant – Zepto Ransomware Appears On The Scene

New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the…

10 years ago

Yingmob Chinese Ad Company infected 10 million Android devices for click revenue

Chinese Ad company Yingmob ’s developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad…

10 years ago

Undetectable Adwind RAT used in targeted attacks

Experts from security firm Heimdal Security have detected a malicious spam campaign delivering attachments laced with the Adwind RAT. Experts…

10 years ago

UN seeking solutions to stopping drug trade on dark web

The United Nation’s Office on Drugs and Crime published its annual report and placed special emphasis on curbing the illicit…

10 years ago

Hacking a Facebook profile with a fake passport

Hacking a Facebook profile -An unidentified hacker successfully took over a Facebook account with a social engineering attack that involved…

10 years ago

This website uses cookies.