Mozilla said that data stolen from its bug tracking system was used to attack Firefox users in the wild, but attackers probably have had access since 2013. A threat actor that stole sensitive vulnerability information from the Mozilla’s Bugzilla bug tracking system last year has likely used it to target Firefox users. Mozilla explained that it did […]
A new variant of Android ransomware relies on the instant messaging protocol XMPP to establish a communication with C&C servers. According to security researchers at Check Point Software Technologies a new Android ransomware disguised as a video player app implements a method of communication different from any other similar threat. This Android ransomware is different from […]
A huge number of individuals are in danger because of massive attacks by Russian hackers, total 97 websites have been broken and most of them are dating sites. Security experts at Hold Security discovered that a significant amount of websites, including dating portals like the Ashley Madison, has been targeted by massive attacks managed by Russian hackers. The […]
Agora black marketplace announced Tuesday evening that it will go temporary offline fearing the exploitation of the Tor flaws recently discovered. Operators of principal black markets are concerned about the real level of anonymity offered by the Tor network after the discovery of critical vulnerabilities affecting the anonymizing system. The administrators of the Agora black market, one […]
PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that compromised over 225,000 Apple accounts. Palo Alto networks announced recently that a new iOS malware called KeyRaider allowed crooks to take over more than 225.000 apple accounts on jailbroken iOS devices. KeyRaider allows the attackers […]
Corebot is a new data stealer discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their solutions. Corebot is the name of a new data stealer malware discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their product, the Trusteer Apex […]
Six British teenagers have been arrested on suspicion of attacking websites by using the Lizard Squad’s DDoS tool, the Lizard Stresser. Lizard Squad is the popular hacking crew that brought the online gaming networks Sony PlayStation Network and Microsoft Xbox Live with major Distributed Denial-of-Service (DDoS) attacks. The hackers developed a tool dubbed Lizard Stresser that draws on Internet […]
The FBI published an alert on the significant increase of the Business Email Scams (BEC), the number of victims is growing such as the financial losses. Yesterday the FBI warned the world that Business Email Scams (BEC) victims are growing, making companies losing money. The law enforcement highlights that frauds use to start with crooks […]
A research conducted by the IBM X-Force team reveals that a growing number of cyber attacks against big IT enterprises relies on the Tor network. With the increase of Tor-based attacks, something needs to change, and IBM is advising companies to start blocking Tor. A research conducted by the IBM X-Force team reveals that SQL […]
A new variant of the popular Zeus banking trojan dubbed was Sphinx is appeared for sale on the black market, it operates entirely through the Tor network. A few days ago a new variant of the popular Zeus banking trojan was offered for sale on the black market, its name is Sphinx. Sphinx code is […]