The ICANN has issued a warning to inform who registered with ICANN.org that their profile accounts were accessed by an “unauthorized person.” The Internet Corporation for Assigned Names and Numbers (ICANN) has issued another security warning after login credentials of the ICANN.org website have been compromised. A new incident occurred to the ICANN (Internet Corporation for […]
Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces. Cybercrime becomes even more sophisticated and explores new technologies for its illegal activities. A growing problem for law enforcement agencies world worldwide is to track illegal activities in the Dark Web. Not only cyber criminals, but also groups […]
Version 3.0 of the RIG exploit kit has been released with new significant improvement. It has already infected more than 1.3 million PC worldwide. Early 2015, part of the source code for the 2.0 version of the RIG exploit kit was leaked online due to a dispute between the main developer and a reseller. According […]
Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. Hackers requested a $15,000 ransomware. Hackers are raising the bar, one of the most popular Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. The data breach highlighted serious security issues in the […]
Experts at Trend Micro discovered that cyber criminals are exploiting the popular Angler Exploit kit to find and infect PoS systems. The popular Angler Exploit kit is used by criminal crews to find and infect PoS systems, this is the last disconcerting discovery made by the experts at Trend Micro. The security researcher Anthony Joe […]
Security Firm Cyphort Labs reported that 10 million users may have been infected in ten days by a malvertising and exploit kit campaign. Nick Bilogorskiy, a security researcher at Cyphort revealed that 10 million users may have been infected in ten days due to a malvertising and exploit kit campaign. According to the expert threat actors […]
Experts discovered a new Google Drive phishing campaign in which the threat actors deployed phishing web pages on Google Drive. Once again phishers exploited Google’s reputation running a phishing campaign aimed to steal user Google credentials and access to the multitude services offered by the company. The new phishing campaign was discovered by the security […]
The administrator of the popular Darkode hacking forum announced that the platform will back online soon with new security improvements. A few days ago Darkode, a black market specialized in the sale of exploit kits and hacking tool was shut down by an international operation of law enforcement. A joint operation run by the FBI and other […]
Mobile Malware is growing and crooks are targeting the advertising industry to redirect users to ad pages in a sort of Advertising hijacking. Mobile Malware is growing and crooks are targeting the advertising industry with malicious codes able to redirect users to ad pages, this practice is known as Advertising hijacking. These “rogue mobile apps” […]
FireEye published a report on the operations of a group of 419 scammers located in Nigeria, which is using malware as a component of their fraud scams. Security firm FireEye has published a new report on a new group of 419 scammers that is using keyloggers and other malware to implement its fraud scheme. According to the investigators, the fraudsters diverted potentially millions […]