underground

Project Cumulus – Tracking fake phished credentials leaked to Dark WebProject Cumulus – Tracking fake phished credentials leaked to Dark Web

Project Cumulus – Tracking fake phished credentials leaked to Dark Web

Project Cumulus - A group of experts at Bitglass used watermarks to track data through the Dark Web and discover…

9 years ago
CenterPOS – The evolution of POS malwareCenterPOS – The evolution of POS malware

CenterPOS – The evolution of POS malware

Security Experts at FireEye discovered a new strain of POS malware dubbed CenterPOS that is threatening the retail systems. In…

9 years ago
Tinba, a 20KB trojan that scares banks in Singapore and IndonesiaTinba, a 20KB trojan that scares banks in Singapore and Indonesia

Tinba, a 20KB trojan that scares banks in Singapore and Indonesia

A new variant of the infamous Tinba banking trojan has emerged in the wild and is targeting financial institutions in…

9 years ago
Dating scam package offered in the undergroundDating scam package offered in the underground

Dating scam package offered in the underground

The popular security expert Brian Krebs has reviewed a dating scam package offered in the underground by Russians fraudsters. Russians…

9 years ago
The North American cyber-criminal underground it’s easy to access!The North American cyber-criminal underground it’s easy to access!

The North American cyber-criminal underground it’s easy to access!

According to a new report published by Trend Micro, the North American cyber criminal underground is very easy to access.…

9 years ago
GovRAT, the malware-signing-as-a-service platform in the undergroundGovRAT, the malware-signing-as-a-service platform in the underground

GovRAT, the malware-signing-as-a-service platform in the underground

Security Experts at InfoArmor discovered GovRAT, a malware-signing-as-a-service platform that is offered to APT groups in the underground. In the…

10 years ago
Iranian Hackers focus their efforts in Android RATsIranian Hackers focus their efforts in Android RATs

Iranian Hackers focus their efforts in Android RATs

A research published by RecordedFuture demonstrates that the interest in Android RATs of Iranian Hackers is rising, DroidJack and AndroRAT…

10 years ago
Who is behind the hack of Uber’s driver database?Who is behind the hack of Uber’s driver database?

Who is behind the hack of Uber’s driver database?

The findings of the investigation conducted by Uber on the recent security breach raise doubts on the alleged involvement of…

10 years ago
Code Signing certificates becoming popular cybercrime commodityCode Signing certificates becoming popular cybercrime commodity

Code Signing certificates becoming popular cybercrime commodity

Learn what Certificates as a Service stand for, discover why Code Signing certificates are a precious commodity and find out…

10 years ago
Tracking Hacker Forums with Traffic AnalysisTracking Hacker Forums with Traffic Analysis

Tracking Hacker Forums with Traffic Analysis

A study conducted by the Intelligence firm RecordedFuture demonstrates the efficiency of the analysis of hacker forums through traffic analysis-like…

10 years ago