Cybersecurity

Operation Heracles strikes blow against massive network of fraudulent crypto trading sites

In a significant crackdown against online cybercriminals, German authorities have successfully dismantled a network of fraudulent cryptocurrency investment sites that has targeted millions of...

Gollumfun (Part 1) – Darknet Diaries

Full Transcript Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Library and Shadow Crew. He tells his story...

Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware,...

Troy Hunt: Weekly Update 473

This week's video was recorded on Friday morning Aussie time, and as...

WhatsApp Worm Targets Brazilian Banking Customers – Sophos News

Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started...

How Threat Hunting Builds Readiness

Every October brings a familiar rhythm - pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox....

Developing a machine-learning model to detect DLL hijacking

DLL hijacking is a common technique in which attackers replace a library called by a legitimate process with a malicious one. It is used...

RedTail Observations from a Honeypot

.] Ransomware is often the first word that comes to mind when we think about cybercriminals chasing financial gain. It barges in, locks files,...

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS – Krebs on Security

The world’s largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet...

When your mouse turns snitch, and hackers grow a conscience • Graham Cluley

Your computer’s mouse might not be as innocent as it looks – and one ransomware crew...

Oak Cliff Swipers – Darknet Diaries

Full Transcript He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens...

A Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI...

Recent articles