underground

Sphinx, a new variant of Zeus available for sale in the undergroundSphinx, a new variant of Zeus available for sale in the underground

Sphinx, a new variant of Zeus available for sale in the underground

A new variant of the popular Zeus banking trojan dubbed was Sphinx is appeared for sale on the black market,…

10 years ago
Facebook API flaw Left 1.44 Billion Users’ Identities at riskFacebook API flaw Left 1.44 Billion Users’ Identities at risk

Facebook API flaw Left 1.44 Billion Users’ Identities at risk

A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users…

10 years ago
A former intern at FireEye accused for Dendroid RAT developingA former intern at FireEye accused for Dendroid RAT developing

A former intern at FireEye accused for Dendroid RAT developing

A former intern at FireEye firm has been arrested for developing and distributing the sophisticated Android malware dubbed Dendroid. A…

10 years ago
Lordfenix: 20-year-old Brazilian has written 100 banking trojanLordfenix: 20-year-old Brazilian has written 100 banking trojan

Lordfenix: 20-year-old Brazilian has written 100 banking trojan

Trend Micro has identified Lordfenix, a student that created more than 100 different banking Trojans and other malicious tools, since…

10 years ago
Experts found Government Credentials on the Open Web too easilyExperts found Government Credentials on the Open Web too easily

Experts found Government Credentials on the Open Web too easily

Recorded Future discovered that credentials stolen in a number of breaches and belonging to government agencies are available online on…

10 years ago
SCADA systems available for sale in the UndergroundSCADA systems available for sale in the Underground

SCADA systems available for sale in the Underground

Security experts have discovered the availability in underground forums of the credentials and other information related to SCADA systems. SCADA…

10 years ago
A quick tour in the hacking black marketA quick tour in the hacking black market

A quick tour in the hacking black market

A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent…

10 years ago
Hiring hackers, how much is it?Hiring hackers, how much is it?

Hiring hackers, how much is it?

In recent years the perception of the role of hackers is completely changed, in the past these high-skilled professionals were viewed as dangerous…

10 years ago
Phasebot, the fileless malware sold in the undergroundPhasebot, the fileless malware sold in the underground

Phasebot, the fileless malware sold in the underground

Security experts at Trend Micro have discovered Phasebot malware, which also has fileless infection as part of its routine, is…

10 years ago
How far do stolen data get in the deep web after a breach?How far do stolen data get in the deep web after a breach?

How far do stolen data get in the deep web after a breach?

A group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does…

10 years ago