malware

Cybercriminal threatens to sell 3.7M Customers data Israeli Banks

A group of hackers has threatened Israeli banks to disclose stolen data belonging 3.7 million customers unless the organizations pay…

12 years ago

OPSEC novice … here the manual for perfect cyber criminals

Cyber security expert Dancho Danchev profiled a new OPSEC training services in the underground, a new trend that is converging…

12 years ago

Advanced Power hits Firefox Users to conduct vulnerability scanning

KrebsOnSecurity has discovered an unusual botnet that disguises itself as a legitimate add-on for Mozilla Firefox to perform website vulnerability…

12 years ago

Cyber security, Questions and Answers with the expert

Interview with the security experts Andrey Komarov and Dan Clements of IntelCrawler to analyze significant evolutions in the cyber-threat landscape.…

12 years ago

Website traffic report shows an increase of malicious bots activity

Incapula security firm published a new report on the analysis of website traffic evidencing the increment for malicious activities. Researchers…

12 years ago

ENISA Threat Landscape 2013 report, the rise of cyber threats

ENISA releases the ENISA Threat Landscape 2013, it a collection of information on top cyber-threats that have been assessed in…

12 years ago

Detected 64-bit ZeuS banking trojan using Tor network

Security researchers at Kaspersky Lab have detected a 64-bit Zeus banking trojan version enhanced with communication capability on the Tor…

12 years ago

Microsoft,Europol,FBI and partners decapitated ZeroAccess botnet

Microsoft Digital Crimes Unit, FBI, Europol and industry partners decapitated the feared ZeroAccess botnet that hijacks search results Microsoft this…

12 years ago

Two Million social media credentials stolen by cybercriminals

Two Million stolen Facebook, Twitter login credentials were found on 'Pony Botnet' Command and Control Server by Trustwave's researchers. Two…

12 years ago

Malware can infect system using Inaudible Audio signals

German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio…

12 years ago

This website uses cookies.