I2P

Research confirms rampant sale of SSL/TLS certificates on darkwebResearch confirms rampant sale of SSL/TLS certificates on darkweb

Research confirms rampant sale of SSL/TLS certificates on darkweb

A study conducted by academics discovered that SSL and TLS certificates and associated services can be easily acquired from dark…

6 years ago
Leaked memo suggest NSA and US Army compromised Tor, I2P, VPNs and want to unmask Monero usersLeaked memo suggest NSA and US Army compromised Tor, I2P, VPNs and want to unmask Monero users

Leaked memo suggest NSA and US Army compromised Tor, I2P, VPNs and want to unmask Monero users

The image of a memo leaked online suggests US Army and NSA are able to unmask Tor, I2P, VPNs users…

7 years ago
Crooks use seemingly harmless help files to serve CryptoWall ransomwareCrooks use seemingly harmless help files to serve CryptoWall ransomware

Crooks use seemingly harmless help files to serve CryptoWall ransomware

Experts at Bitdefender revealed that crooks used seemingly harmless help files to distribute a variant of the popular ransomware CryptoWall.…

10 years ago
New DYRE banking malware in the wildNew DYRE banking malware in the wild

New DYRE banking malware in the wild

The experts at TrendMicro detected a new variant of the DYRE /Dyreza banking malware with new propagation and evasion techniques.…

10 years ago
CryptoWall 3.0 hides C&C Communications with I2P Anonymity NetworkCryptoWall 3.0 hides C&C Communications with I2P Anonymity Network

CryptoWall 3.0 hides C&C Communications with I2P Anonymity Network

Security Experts at Microsoft discovered a new variant of CryptoWall 3.0 ransomware that adopts I2P Anonymity Network for C&C Communications.…

10 years ago
Tails live OS affected by critical zero-day vulnerabilities … Exodux disclosed the detailsTails live OS affected by critical zero-day vulnerabilities … Exodux disclosed the details

Tails live OS affected by critical zero-day vulnerabilities … Exodux disclosed the details

A researchers at the Exodus Intelligence firm has discovered a series of zero day vulnerabilities in the popular Tails Linux-based…

11 years ago
162,000 WordPress instances abused for DDoS attack162,000 WordPress instances abused for DDoS attack

162,000 WordPress instances abused for DDoS attack

Sucuri firm detected a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect amplification vectors. The security…

11 years ago
DNS amplification botnet available in the undergroundDNS amplification botnet available in the underground

DNS amplification botnet available in the underground

Security expert Dancho Danchev profiled a recently released DNS amplification DDoS service available for sale in the underground. Recently the…

11 years ago
OPSEC novice … here the manual for perfect cyber criminalsOPSEC novice … here the manual for perfect cyber criminals

OPSEC novice … here the manual for perfect cyber criminals

Cyber security expert Dancho Danchev profiled a new OPSEC training services in the underground, a new trend that is converging…

11 years ago
Cyber security, Questions and Answers with the expertCyber security, Questions and Answers with the expert

Cyber security, Questions and Answers with the expert

Interview with the security experts Andrey Komarov and Dan Clements of IntelCrawler to analyze significant evolutions in the cyber-threat landscape.…

11 years ago