• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Asian media company Nikkei suffered a ransomware attack
  • Russia-linked Sandworm continues to conduct attacks against Ukraine
  • Cisco fixes an IOS XR flaw actively exploited in the wild
  • QNAP warns of a new wave of DeadBolt ransomware attacks against its NAS devices
  • Pwn2Own Vancouver 2022 D2
  • The activity of the Linux XorDdos bot increased by 254% over the last six months
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Deep Web (Page 28)

Deep Web

Boffins analyzed EXIF metadata in photos on principal blackmarkets

Two researchers have analyzed images Exif metadata included in the photos used by crooks to advertise their products on black marketplaces in the dark web. Darknets are a privileged environment for crooks that intend to develop a prolific business protecting...

September 19, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web 

Members call for a Tor General Strike and shut down Tor for a day

A few members of the community are calling for a 'Tor general strike' to protest against some decisions taken recently by the core members. Last month, the Tor Project announced that an internal investigation had confirmed the allegations of sexual...

August 22, 2016  By Pierluigi Paganini   Posted In  Breaking News  Deep Web  Digital ID 

ZITiS is the new German Government cyber unit in wake of terror attacks

The German Government announced last week the creation of a new cyber security unit named ZITiS to tackle terrorists online in a wake of terror attacks. The fear of a terror attack is pushing every government and international law enforcement agencies in...

August 15, 2016  By Pierluigi Paganini   Posted In  Breaking News  Deep Web  Terrorism 

Scylex malware Kit offered for sale in the criminal underground

Experts from Heimdal security firm discovered a new crimeware kit, the Scylex malware kit, that aims to provide Zeus-grade Capabilities. Security experts from the Heimdal security firm have discovered a new DIY financial crime kit offered for sale on...

August 13, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web  Malware 

Automated systems crawl the DarkWeb to find Zero-Days

A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence Can finding zero-day vulnerabilities be as easy as crawling the Darkweb? Security researchers at Arizona...

August 9, 2016  By Pierluigi Paganini   Posted In  Breaking News  Deep Web  Hacking 

Peace is advertising 200 Million alleged Yahoo accounts on Dark Web

The notorious hacker Peace is advertising 200 Million alleged Yahoo accounts on Dark Web, and the company is aware of the sale. Do you remember the notorious hacker Peace? He is the hacker that offered for sale the dumps of LinkedIn and MySpace,...

August 2, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Data Breach  Deep Web  Hacking 

After mass shooting in Germany, it is dark web paranoia

Is it so easy to buy a weapon on the Dark Web? Access a dark net, buy a weapon, make a massacre. Is this the crime chain behind recent attacks? After mass shooting recently occurred in Germany the Dark Web monopolized the headlines. According to several...

July 28, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web 

Hackers are offering for sale O2 customer data on the dark web

O2 customer data that was reportedly first stolen from the gaming site XSplit in November 2013 are now offered for sale on the Dark Web. In the dark web it is possible to find any kind of illegal product and services, from weapons to payment card...

July 26, 2016  By Pierluigi Paganini   Posted In  Breaking News  Deep Web 

Munich Gunman purchased the weapon on the Dark Web

David S., the Munich gunman has purchased the weapon on the Dark Web, sincerely I was waiting for this title in the headlines, but ... In Germany, it is quite difficult to pay for weapons so how the Munich gunman got a 9mm Glock 17? According to several...

July 25, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web 

Delilah, the first Trojan to recruit Insiders

Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed to extort victims into stealing insider data, it was first discovered...

July 20, 2016  By Pierluigi Paganini   Posted In  Cyber Crime  Deep Web  Malware 


« First‹ Previous2425262728293031Next ›
Page 28 of 31



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT