Security Affairs

Experts believe the Magecart Group 5 could be linked to the Carbanak APT

Security experts linked the Magecart group 5 to the infamous Dridex banking Trojan and the Carbanak cybercrime group. Researchers at…

6 years ago

Autoclerk travel reservations platform data leak also impacts US Government and military

vpnMentor’s discovered a breach in a database belonging to Autoclerk, a reservations management system owned by Best Western Hotels and Resorts…

6 years ago

German firm Pilz still down a week after getting infected with ransomware

German company Pilz, one of the world’s biggest producers of automation tools is still down after getting infected by ransomware…

6 years ago

Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCs

A vulnerability in the Trend Micro Anti-Threat Toolkit (ATTK) can be exploited by attackers to run malware on targets' Windows…

6 years ago

NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches

NordVPN and TorGuard VPN firms were hacked, threat actors leaked the private keys used to secure their web servers and VPN…

6 years ago

Czech Police and Intelligence agency dismantled Russian Spy ring on its soil

Czech police and intelligence services have identified a Russian espionage network operating having a nerve center in its Prague embassy.…

6 years ago

Avast internal network breached for the second time by sophisticated hackers

The popular security firm Avast disclosed today a security breach that impacted its internal network accessed via a compromised VPN…

6 years ago

TA505 cybercrime group use SDBbot RAT in recent campaigns

TA505 cybercrime group that operated the Dridex Trojan and Locky ransomware, has been using a new RAT dubbed SDBbot in…

6 years ago

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

The news is quite curious, the US military will no longer use 8-inch floppy disks in an antiquated computer (SACCS)…

6 years ago

Fake UpdraftPlus WordPress Plugins used to backdoor sites

Threat actors leverage malicious plugins that hide in plain sight to backdoor WordPress websites and to use them for brute-forcing…

6 years ago

This website uses cookies.