ATMs in Thailand hacked by a cybercrime gang linked to Taiwan theft
Thailand – A gang of foreign criminals stole millions of baht by hacking ATMs in the country. The gang is linked the one that hacked ATMs in Taiwan. Hackers belongingRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
Thailand – A gang of foreign criminals stole millions of baht by hacking ATMs in the country. The gang is linked the one that hacked ATMs in Taiwan. Hackers belongingRead More →
Victims of a ransomware campaign aimed at Dutch speakers don’t have to pay hackers after the No More Ransom project cracked its cipher. Victims of the Wildfire ransomware can getRead More →
We are not sure if this is going to be a new trend among browser hijackers, but it seems more than a coincidence that we found two browser hijackers usingRead More →
During the last weeks we’ve been investigating multiple aspects of GSM security such as protocol vulnerabilities as well as source auditing the world’s most common open source software products thatRead More →
With only a small amount of work, ExtraBacon will commandeer new versions of ASA. Recently released code that exploits Cisco System firewalls and has been linked to the National Security AgencyRead More →
Researchers said a new variant of the Hancitor downloader has shifted tactics and adopted new dropper strategies and obfuscation techniques on infected PCs. Researchers at Palo Alto Networks are currently tracking the biggest pushRead More →
More than 800,000 usernames and email addresses were taken, but most of the passwords aren’t readable or easily crackable. The company later confirmed. A hacker has stolen hundreds of thousandsRead More →
This week we’ve detected an unsophisticated piece of malware targeting mobile subscribers in North America. The malware termed a RAT (remote access tool) is being sent via SMS in theRead More →
Secure payment system Bitcoin has many legitimate uses, but like other technologies, it’s also been beneficial to cybercriminals seeking new ways to extort money. Ransomware is booming. Be it Locky,Read More →
DNSSEC is the best tool to protect against DNS hijacking and DNS cache poisoning but can be hijacked for DDoS attacks. Network security firm Neustar says that around 80 percentRead More →
Researcher claims that iPhone’s ‘Live Photos’ can be used to hack 2 banks apps. In a shocking discovery, a researcher found that 2 banks’ mobile phone apps were susceptible to hack,Read More →
Trojan targets CMS platforms running on Linux servers. What initially looked like a string of Drupal sites infected with ransomware (that didn’t work properly) now looks like a professional cybercrime operationRead More →
Exploit against Cisco’s PIX line of firewalls remotely extracted crypto keys. In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customersRead More →
A new ransomware called DetoxCrypto has been discovered by MalwareHunterTeam that is currently being distributed under two different variants. The first variant looks like a generic ransomware but contains the interestingRead More →
Microsoft delays fixing the reported issue. enSilo senior security researcher Yotam Gottesman has discovered a simple method of bypassing the Windows User Account Control (UAC) mechanism that affects all supported WindowsRead More →
Bitcoin traders have been warned that the upcoming Bitcoin Core software release will become a top target for well-funded hacking groups. Bitcoin.org has warned users to be aware that theRead More →
The Adwind Remote Access Trojan (RAT) is a popular Java-based backdoor capable of infecting Windows, Linux, Mac OS and Android operating systems. Its cross-platform nature, elaborate backdoor features, and relativelyRead More →
Palo Alto Networks has identified a malware family known as ‘Aveo’ that is being used to target Japanese speaking users. The ‘Aveo’ malware name comes from an embedded debug stringRead More →
If the malware found any German financial apps installed in the device, it would show a fake page asking for credentials of that particular institution. Unaware that the login pageRead More →
Former NSA security scientist concurs exposure by “Equation Group” connected to DNC leak. Two former employees of the National Security Agency—including exiled whistleblower Edward Snowden—are speculating that Monday’s leak of whatRead More →