information security news

US DoJ seizes $3.36B Bitcoin from Silk Road hacker

The U.S. Department of Justice condemned James Zhong, a hacker who stole 50,000 bitcoins from the Silk Road dark net…

3 years ago

‘Justice Blade’ Hackers are Targeting Saudi Arabia

Threats actors calling themselves "Justice Blade" published leaked data from an outsourcing IT vendor. The group of threat actors calling…

3 years ago

Robin Banks phishing-as-a-service platform continues to evolve

The phishing-as-a-service (PhaaS) platform Robin Banks migrated its infrastructure to DDoS-Guard, a Russian bulletproof hosting service. The phishing-as-a-service (PhaaS) platform Robin…

3 years ago

Water sector in the US and Israel still unprepared to defeat cyber attacks

Expert warns that the US and Israel are still unprepared to defeat a cyber attack against organizations in the water…

3 years ago

UK NCSC govt agency is scanning the Internet for flawed devices in the UK

The UK National Cyber Security Centre (NCSC) announced that is scanning all Internet-exposed devices hosted in the UK for vulnerabilities.…

3 years ago

Abusing Microsoft Dynamics 365 Customer Voice in phishing attacks

Researchers uncovered a campaign abusing Microsoft Dynamics 365 customer voice to steal credentials from the victims. Microsoft's Dynamics 365 Customer…

3 years ago

LockBit 3.0 gang claims to have stolen data from Kearney & Company

The ransomware group LockBit claimed to have stolen data from consulting and IT services provider Kearney & Company. Kearney is…

3 years ago

A cyberattack blocked the trains in Denmark

At the end of October, a cyber attack caused the trains to stop in Denmark, the attack hit a third-party…

3 years ago

Security Affairs newsletter Round 392

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

3 years ago

Zero-day are exploited on a massive scale in increasingly shorter timeframes

Microsoft warns of an uptick among threat actors increasingly using publicly-disclosed zero-day exploits in their attacks. According to the Digital…

3 years ago

This website uses cookies.