DIY

Dendroid – A new Android RAT available on the undergroundDendroid – A new Android RAT available on the underground

Dendroid – A new Android RAT available on the underground

Symantec discovered a new HTTP Android Remote administration tool, named Dendroid, available on the underground market for only $300. Symantec…

11 years ago
TDoS products evolution in the underground marketTDoS products evolution in the underground market

TDoS products evolution in the underground market

Danco Danchev profiled a new TDoS product sold in underground based on 3G USB modem/GSM/SIM card, cybercrime is increasing its…

11 years ago
AndroRAT drives the rise for DIY Android hacking toolsAndroRAT drives the rise for DIY Android hacking tools

AndroRAT drives the rise for DIY Android hacking tools

AndroRAT is just one of the numerous open-source tools that was created and published on the undergroud forums to allow…

12 years ago
Brute-forcing applications spotted in the wild … pros and consBrute-forcing applications spotted in the wild … pros and cons

Brute-forcing applications spotted in the wild … pros and cons

Brute forcing applications spotted in the wild demonstrates the continual interest of cybercrime ... What is the limitations of this attack…

12 years ago
Android botnets on the rise – case studyAndroid botnets on the rise – case study

Android botnets on the rise – case study

Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and…

12 years ago
DDoS – Evolution of DIY tools in the undergroundDDoS – Evolution of DIY tools in the underground

DDoS – Evolution of DIY tools in the underground

When the DDoS topic is introduced it's immediate to link it with the most popular tools usable for this type…

12 years ago
Rise of DIY, new botnet and keylogger generating tool in the wildRise of DIY, new botnet and keylogger generating tool in the wild

Rise of DIY, new botnet and keylogger generating tool in the wild

Not a day goes by that we're talking about powerful cyber attacks and the sensational cyber espionage campaigns, the dangerous…

12 years ago