Cybercrime

How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the…

10 years ago

More Fallout from the LinkedIn Breach in new Targeted Attacks on Banking

CERT-Bund released a warning that corporate executives may be being targeted with malicious emails using data from the LinkedIn data…

10 years ago

Necurs Botnet, one of the world’s largest malicious architecture has vanished

The Necurs Botnet, one of the world's largest malicious architecture, used to spread the dreaded threats appears to have vanished…

10 years ago

CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on the Neutrino Exploit Kit instead the…

10 years ago

Companies Are Stockpiling Bitcoin To Quickly Pay Off Ransomware Criminals

New research conducted by Citrix indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast in case…

10 years ago

Watch out, Angler Exploit Kit is able to bypass Microsoft EMET defense

Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET…

10 years ago

As of the end of March, 93 percent of all phishing emails contained ransomware

The anti-phishing company PhishMe that observed that as of the end of March 93 percent of all phishing emails contained…

10 years ago

Sh0ping.su hacked, stolen card data and accounts available for sale

The notorious crime forum Sh0ping[.]su has been hacked by unknowns that leaked online credit card data and stolen accounts. Data…

10 years ago

Old CVE-2014-3704 flaw in Drupal still exploited in attacks

More than 19 months after its public disclosure the CVE-2014-3704 is still exploited in attacks against Drupal-based websites. It was…

10 years ago

FastPOS PoS malware implements a quick exfiltration method

Trend Micro experts discovered a new strain of Point-of-Sale (PoS) malware dubbed FastPOS that implements a quick and efficient exfiltration…

10 years ago

This website uses cookies.