The Interpol has recently announced the creation of its own cryptocurrency with the intent to understand the abuses and fight virtual currency crime. According to Dr. Madan Mohan Oberoi, Director of Cyber Innovation and Outreach in the INTERPOL Global Complex for innovation (IGCI) being set up in Singapore, the Interpol is working to design of a Cryptocurrency. […]
During a recent investigation the experts at Trustwave encountered a new strain of POS malware dubbed Punkey which presents interesting features. Malware researchers at Trustwave have detected a new point of sale (PoS) malware dubbed Punkey that was used by criminal crews to compromise payment systems of some organisations. The experts discovered Punkey during a law […]
FireEye recently detected a new highly targeted attack run by APT28 exploiting two zero-day flaws to compromise an “international government entity”. Security experts at FireEye have recently detected a new cyber espionage campaign, dubbed “Operation RussianDoll,” operated by the Russian APT28 group. This time the hackers run highly targeted attack by exploiting two zero-day vulnerabilities to target an “international […]
A new deep web marketplace dubbed TheRealDeal has appeared and it is offering a platform for both sellers and buyers of the zero-day exploits. The anonymity ensured by the Dark Web and black markets it hosts is an element of attractive for cyber criminal and intelligence agencies. Black markets offer a wide range of illegal products and services, despite normal people believes that drugs and […]
WikiLeaks on Thursday published a searchable database of more than 30,000 documents that were obtained by hackers in the cyber attack on Sony Pictures. WikiLeaks organization has leaked online a collection of documents stolen in the Sony Pictures data breach, more than 30,000 files showing the inner workings of a “secretive” firm. WikiLeaks published the […]
Security experts worldwide have discovered that threat actors are exploiting the Microsoft Zero-Day vulnerability MS15-034 in cyber attacks. Security researchers at SANS Internet Storm Center revealed that the critical remote code execution vulnerability MS15-034 affecting the Windows HTTP protocol stack is being actively exploited in the wild. The experts explained that the MS15-034 flaw affects […]
A lawyer who has been dealing with a whistleblower case has claimed that a hard drive used as evidence and sent by the police has infected with spying Trojan. A lawyer from Arkansas is now representing three police officers from Fort Smith at a case of whistleblowers and has now found himself in the middle […]
A group of cyber criminals hacked systems the systems of the France Televisions and have stolen data on 100,000 contacts stored by the French state TV. Another cyber attack hit a French TV, this time the hackers compromised the computers at the network of the broadcaster stealing personal data belonging 100,000 contacts. According to an […]
The victims of CoinVault ransomware can now decrypt the files encrypted by the malicious code by using a free removal tool released by Kaspersky firm. There is good news for you, dear reader, if you are facing this problem with CoinVault Ransomware, Kaspersky just found the solution to end your problems. Now it’s possible to […]
The elite cyber crime group Hellsing strikes back after attack by the rival APT crew known as Naikon. This is the first documented case of APT-on-APT attack. What happens when an APT group running a cyber espionage campaign target a second distinct APT group? The events occurred last year, when a group involved in a cyber espionage campaign […]