DDoS

How to exploit iFramed based traffic E-shop for illegal activitiesHow to exploit iFramed based traffic E-shop for illegal activities

How to exploit iFramed based traffic E-shop for illegal activities

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible…

12 years ago
FireEye World War C report – Nation-state driven cyber attacksFireEye World War C report – Nation-state driven cyber attacks

FireEye World War C report – Nation-state driven cyber attacks

FireEye security firm released World War C report to explain nation-state motives behind advanced Nation-state driven cyber attacks. Nation-state driven…

12 years ago
Thousands of hacked WordPress sites used in global scale attacksThousands of hacked WordPress sites used in global scale attacks

Thousands of hacked WordPress sites used in global scale attacks

Thousands of Wordpress based websites have been hacked to compose a global scale botnet that is performing powerful DDOS attacks. I start…

12 years ago
Group-IB Threat Intelligence Report 2012–2013 H1, a must readGroup-IB Threat Intelligence Report 2012–2013 H1, a must read

Group-IB Threat Intelligence Report 2012–2013 H1, a must read

Group-IB Threat Intelligence Report 2012–2013 H1 is an excellent analysis on the state and dynamics of today’s market of computer…

12 years ago
Man In The Browser attacks scare banking worldMan In The Browser attacks scare banking world

Man In The Browser attacks scare banking world

The majority of financial service professionals considers Man In The Browser as the greatest threat to online banking, cybercrime increases…

12 years ago
China hit by DDoS attack. The Internet inaccessible for hoursChina hit by DDoS attack. The Internet inaccessible for hours

China hit by DDoS attack. The Internet inaccessible for hours

China hit by DDoS attack. The CINIC confirmed that the country suffered a DDoS attack over the weekend causing the…

12 years ago
DDoS to hide attacks against wire payment switch systemsDDoS to hide attacks against wire payment switch systems

DDoS to hide attacks against wire payment switch systems

Fraudsters target wire payment switch at US banks to steal millions using DDoS to divert the attention on fraudulent transactions. Cybercriminals are…

12 years ago
A reading of the ENISA Annual Incident Reports 2012A reading of the ENISA Annual Incident Reports 2012

A reading of the ENISA Annual Incident Reports 2012

ENISA issued the ENISA Annual Incident Reports 2012 on significant incidents in the electronic communications sector, which were reported to…

12 years ago
USB Internet Modems vulnerability exposes Millions of PCsUSB Internet Modems vulnerability exposes Millions of PCs

USB Internet Modems vulnerability exposes Millions of PCs

The Indian security expert 'Rahul Sasi' found a USB Internet Modems vulnerability that could allow to gain Meterpreter shell or…

12 years ago
Fort Disco botnet compromised more than 6000 websitesFort Disco botnet compromised more than 6000 websites

Fort Disco botnet compromised more than 6000 websites

Researchers at Arbor Networks discovered a botnet called Fort Disco that was used to compromise more than 6000 websites based on…

12 years ago