• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • QNAP warns of a new wave of DeadBolt ransomware attacks against its NAS devices
  • Pwn2Own Vancouver 2022 D2
  • The activity of the Linux XorDdos bot increased by 254% over the last six months
  • Conti ransomware is shutting down operations, what will happen now?
  • Google OAuth client library flaw allowed to deploy of malicious payloads
  • Pwn2Own Vancouver 2022 D1: MS Teams exploits received $450,000
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 378)

Cyber Crime

“TNT” gang has released a new hardware TDoS tool in the criminal underground

Telephone DDoS attacks are on the rise, the  criminal group known as “TNT” gang has released a new hardware tool in the underground ecosystem. The IntelCrawler cyber threat intelligence company has discovered a new advanced tool, dubbed 'TNT Instant...

February 20, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Mobile  Security 

Arid Viper – Israel entities targeted by malware packaged with sex video

Attackers behind the Arid Viper and the Yanbian Gang exploited sex  content for their campaigns against victims in Israel and Kuwait, and South Korea. Security experts at Trend Micro have uncovered a cyber espionage campaign, dubbed Operation Arid Viper,...

February 19, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware 

Yanbian Gang steals millions from mobile banking customers of South Korea

A Chinese hacking crew dubbed Yanbian Gang has siphoned data from mobile banking customers in South Korea during the past two years, according to a new report. According to researchers at Trend Micro, the cybercriminals used fake banking apps having...

February 18, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Mobile 

Ali Baba, the APT group from the Middle East

Adrian Nish of BAE System presented the results of its investigation on the Ali Baba APT group operating from the Middle East that hit Western companies. Yesterday the Kaspersky Lab team revealed the results of its investigation on the hacking crew dubbed...

February 17, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

How attackers use phishing kits for their campaigns

How cyber criminals use several phishing kits to run malicious campaigns and which is the economy behind this category of attacks? Most of the major banks and companies that suffer this type of attacks make people aware of phishing, but despite the high...

February 17, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 

The Equation Group shows most complex and sophisticated hacking techniques ever seen

Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically...

February 17, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Hacking  Intelligence  Malware 

PoS malware infected payment systems at the Jefferson National Parks Association

Jefferson National Parks Association discloses POS breach at Gateway Arch stores caused by a malware infection of the payments systems. Jefferson National Parks Association announced on Friday about malware found on Point-of-Sale (POS) Systems deployed...

February 17, 2015  By Pierluigi Paganini   Posted In  Cyber Crime 

Law enforcement speculates that ISIS is already using Bitcoin

Law enforcement investigating on terrorism and speculate that terrorists including ISIS members already use Bitcoin and other virtual currencies. The ISIS continues to threaten the world, the group is growing in popularity and its operations are...

February 16, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence 

Gemalto published the Breach Level Index Report. More than 1 billion data records were stolen

Gemalto has issued the 2014 Breach Level Index based on data gathered from publicly-available information about data breaches throughout the world. A new research published by Gemalto security firms reveals that more than 1 billion data records were...

February 16, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Carbanak cybergang swipes over $300 million from banks

Kaspersky discovered that a multinational gang of hackers dubbed Carbanak cybergang has stolen at least $300 million from 100 financial institutions. A group of cybercriminals used a malware to steal at least $300 million from banks and other financial...

February 15, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking 


« First‹ Previous374375376377378379380381382Next ›Last »
Page 378 of 454



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT