Monthly Archives: February 2016

Operation Blockbuster revealed the Lazarus Group Activities

The Operation BlockBuster Coalition has disclosed the results of its investigation on the activities of the Lazarus Group that…

Operation Dust Storm, hackers target Japanese Critical Infrastructure

Japanese commercial and critical infrastructure organizations have been targeted a long-running campaign dubbed Operation Dust Storm. Security…

Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center

The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due…

Linux Mint was hacked, website served malicious ISO on Saturday

The Linux Mint website had been hacked, on Saturday, intruders were able to compromise it and serve…

Linux Fysbis Trojan, a new weapon in Pawn Storm’s arsenal

Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by…

Hollywood Presbyterian Medical Center taken offline; $3.6M ransom

Cyber criminals demanded $3.6M after a ransomware-based attack takes offline the systems at the Hollywood Presbyterian Medical…

Should Apple Backdoor iPhones for the US Government?

Apple has claimed to make the most secure smartphones and tablets and for years, that has remained…

Approximate machine improves the Bitcoin mining by 30 percent

A team of Illinois-based scientists have conducted a research to improve the Bitcoin mining process by 30…

Carbanak cybergang is back and it is not alone

Experts at Kaspersky Lab discovered that Carbanak cybergang is back and other groups are adopting similar APT-style techniques to…

T9000 backdoor, a sophisticated malware that spies on Skype users

The T9000 backdoor discovered by PaloAlto Networks is able to infect victims’ machines to steal files, take…

Show Buttons
Hide Buttons