The Rowhammer – the evolution of a dangerous attack over the years

The Rowhammer attack Back in 2015, security researchers at Google’s Project Zero team demonstrated how to hijack an Intel-compatible PCs running Linux by exploiting the physical weaknesses in... Go on to the site to read the full article ... Read More
Crooks Exploit Facebook to Spread Crypto-miner Malware

Crooks Exploit Facebook to Spread Crypto-miner Malware

/ / Phishing
Social networks are a privileged attack vector that could be used by cybercriminals to spread malware to a wide audience. In the last month’s security experts discovered many strains of malware... Go on to the site to read the full article ... Read More

How to Steal Windows Login Credentials Abusing the Server Message Block (SMB) Protocol

Introduction Hackers, cybercriminals, and cyber spies continuously devise new techniques to improve their attacks, in some cases, these methods are first detected when threat actors use them in the... Go on to the site to read the full article ... Read More

ZLAB MALWARE ANALYSIS REPORT: RANSOMWARE-AS-A-SERVICE PLATFORMS

/ / Hacking
Introduction Over the years, the diffusion of darknets has created new illegal business models. Along with classic illegal goods such as drugs and payment card data, other services appeared in the... Go on to the site to read the full article ... Read More
Memcrashed – the dangerous trend behind the biggest-ever DDoS attack

Memcrashed – the dangerous trend behind the biggest-ever DDoS attack

Introduction In November 2017, a group of researchers provided a macroscopic characterization of the DoS ecosystem; they shared their findings at the AMC Internet Measurement Conference in London.... Go on to the site to read the full article ... Read More
Global Cost of Cybercrime on the Rise

Global Cost of Cybercrime on the Rise

Introduction Cyber-criminal activities worldwide continue to increase, in many cases, organized crime rings operate worldwide, and their profits are very high. The consolidation of a model of sales... Go on to the site to read the full article ... Read More
Cryptocurrency mining botnets on the rise

Cryptocurrency mining botnets on the rise

Introduction The peaks reached by the values of principal cryptocurrencies is attracting criminal organizations, the number of cyber-attacks against the sector continues to increase, and VXers are... Go on to the site to read the full article ... Read More
Meltdown and Spectre Patches: a story of delays, lies, and failures

Meltdown and Spectre Patches: a story of delays, lies, and failures

The beginning On January 3, white hackers from Google Project Zero have disclosed some vulnerabilities in Intel chips called Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715),... Go on to the site to read the full article ... Read More
Powerful Skygofree Spyware Was Already Reported and Analyzed In 2016

Powerful Skygofree Spyware Was Already Reported and Analyzed In 2016

The Skygofree spyware analyzed by Kaspersky today was first spotted by the researcher Lukas Stefanko and the first analysis was published last year by the experts of CSE Cybsec ZLab. The Skygofree... Go on to the site to read the full article ... Read More
Malware in Dark Web

Malware in Dark Web

Introduction The Dark Web plays a crucial role in the criminal underground especially for the communities of malware developers; the principal darknets are privileged environments for malware authors... Go on to the site to read the full article ... Read More
Loading...