Domain name fraud: is the global Internet in danger?

Padlokr –  Padlokr –  A spider’s web is secure, and ours? Robert Anasch/Unsplash, CC BY Hervé Debar, Télécom SudParis – Institut Mines-Télécom In late February 2019, the Internet Corporation for Assigned…

Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 years

Padlokr –  Padlokr –  Paul Haskell-Dowland, Edith Cowan University and Andrew Woodward, Edith Cowan University Australian organisations are a soft target for ransomware attacks, say experts who yesterday issued a…

Water Basilisk Campaign Distributes RATs Through a New Crypter

Another malicious operation wreaks havoc in the world of malware and trojans. The so-called Water Basilisk campaign makes use of a new crypter with the goal of RATs distribution. Among…

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Padlokr –  Padlokr –  The FBI’s latest cybersecurity moves bring the government into new territory – inside privately owned computers. AP Photo/Cliff Owen Scott Shackelford, Indiana University The FBI has…

Financial Cybercrime: Why Cryptocurrency is the Perfect ‘Getaway Car’

Threat Post –  Threat Post –  John Hammond, security researcher with Huntress, discusses how financially motivated cybercrooks use and abuse cryptocurrency. This is Part I of a two-part series on…

ZHtrap botnet: How it works and how to prevent it

A new botnet called ZHtrap is deploying honeypots to capture attacks from other botnets and use that information to hijack their infrastructures. Security researchers from Netlab 360 Team discovered a…

DirtyMoe Botnet Returns With Undetectable Threat Profile

Security Intelligence – Security Intelligence – DirtyMoe Botnet Returns With Undetectable Threat Profile The malware botnet known as DirtyMoe has been around since at least 2016, but its newest version…

DreamBus Botnet: An analysis

A new variant of the SystemdMiner threat dubbed DreamBus is impacting Linux servers around the globe to mine cryptocurrency. Linux servers serve an important role in cloud-based infrastructures. This operating…

What is a Honey Pot? [updated 2021]

Introduction: What is a Honeypot? Honeypots are special programs that are written for one purpose: to be exploited. Honeypots emulate the appearance of a vulnerability so that attackers, viruses and…

Hacking communities in the deep web [updated 2021]

The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm’s length; meanwhile today they…