Category: Cyber Crime

Android Malware Operations Expand with Sophisticated An...

Cybersecurity experts have revealed the operational details of an Android malware known as AntiDot, which has infected more than 3...

Mass Website Hijacking Campaign Exploits JSFuck Obfusca...

Security experts have identified an extensive malicious operation targeting legitimate websites through the injection of concealed...

INTERPOL Coordinates Massive Takedown: Over 20,000 Mali...

INTERPOL has announced the successful completion of a major international cybersecurity operation that resulted in the elimination...

Under the cover of hacktivist, a man confesses to hacki...

A 25-year-old man from California, Ryan Mitchell Kramer, has confessed to hacking into Disney’s computer systems and leaking data ...

Cybersecurity Firm Offers to Buy Dark Web Accounts for ...

Threat intelligence firm Prodaft is introducing an unconventional strategy to gather insights from the cybercriminal underground: ...

Using Evidence From Seized Databases, Europol Arrests F...

Law Enforcement Officials Have Said That They Have Located And Arrested At Least Five SmokeLoader Malware Members.

Organizations In The UK Reject Digital Projects Due To ...

With Regard To Nation-State Cyber Threats And AI's Capacity To Intensify Attacks, There Is Much Cause For Concern.

Check Point Contest Hacker's Allegations Of Breach.

The Security Provider Responds That All Of The Data Was Obtained Over Time By Focusing On Certain People Rather Than Directly From...

Bec Fraud

Fraud in Bec

An Agreement Is Signed By Huawei And The Kenyan Nationa...

The National Computer And Cybercrime Coordination committee And Huawei Technologies Kenya Signed A Memorandum Of Understanding Thu...

DollyWay Malware Campaign Exploits 20,000 WordPress Sit...

A nearly decade-long malware campaign, dubbed DollyWay World Domination, has compromised over 20,000 WordPress websites since 2016...

PHP Vulnerability Exploited to Deploy Crypto Miners and...

Cybercriminals are actively exploiting a critical security flaw in PHP (CVE-2024-4577) to deploy cryptocurrency miners and remote ...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.