underground

Bifrose malware leveraging on Tor caught in a targeted attack on a device manufacturerBifrose malware leveraging on Tor caught in a targeted attack on a device manufacturer

Bifrose malware leveraging on Tor caught in a targeted attack on a device manufacturer

Security experts at TrendMicro have detected a new variant of the BIFROSE malware leveraging on the Tor network in a…

11 years ago
Compromised data of 27 million people South Korea. 70 percent of the population suffered a data breach.Compromised data of 27 million people South Korea. 70 percent of the population suffered a data breach.

Compromised data of 27 million people South Korea. 70 percent of the population suffered a data breach.

Authorities confirmed that 27 million individuals in South Korea suffered a data breach, nearly 70 percent of  the population aged…

11 years ago
Russian crime ring amasses over a Billion credentialsRussian crime ring amasses over a Billion credentials

Russian crime ring amasses over a Billion credentials

Experts at Hold Security firm discovered a Russian group of hackers that collected 1.2B stolen credentials obtained in different data…

11 years ago
Indexeus, the search engine which menaced hacking communityIndexeus, the search engine which menaced hacking community

Indexeus, the search engine which menaced hacking community

Indexeus is a new search engine that indexes user account information acquired from data breaches, including hackers' accounts stolen in…

11 years ago
Critroni, a sophisticated ransomware which uses Tor Network as C&CCritroni, a sophisticated ransomware which uses Tor Network as C&C

Critroni, a sophisticated ransomware which uses Tor Network as C&C

A security researcher has detailed Critroni ransomware, a new sophisticated malware which is being sold in different underground forums. In…

11 years ago
Pitty Tiger – small ATPs scare private companiesPitty Tiger – small ATPs scare private companies

Pitty Tiger – small ATPs scare private companies

Security researchers at AIRBUS have uncovered a new APT, named Pitty Tiger, involved in a cyber espionage campaign which targeted…

11 years ago
NightHunter extensive data theft campaign has been active since 2009NightHunter extensive data theft campaign has been active since 2009

NightHunter extensive data theft campaign has been active since 2009

Experts from Cyphort Labs have discovered an extensive data theft campaign named Nighthunter that has been active since 2009 stealing…

11 years ago
Source code of Tinba banking malware leakedSource code of Tinba banking malware leaked

Source code of Tinba banking malware leaked

Security Experts at Danish CSIS Security Group have discovered that source code of Tinba banking trojan was published on an…

11 years ago
Kaspersky Lab reveals an increase in RDP bruteforce attacksKaspersky Lab reveals an increase in RDP bruteforce attacks

Kaspersky Lab reveals an increase in RDP bruteforce attacks

Security experts at Kaspersky Lab have issued data related to the number of RDP brute force attacks on its clients…

11 years ago
Zeus malware is hard to eradicate, the criminal ecosystem continues to innovate itZeus malware is hard to eradicate, the criminal ecosystem continues to innovate it

Zeus malware is hard to eradicate, the criminal ecosystem continues to innovate it

Prolexic security and engineering response team has issued a study on the possible uses of Zeus malware, remarking that its…

11 years ago