Browsing tag

Cybercriminals

Ransomware Affiliate Arrested in Romania; 51 Stolen Data Brokers Arrested in Ukraine

Europol, the European Union’s premier law enforcement agency, has announced the arrest of a third Romanian national for his role as a ransomware affiliate suspected of hacking high-profile organizations and companies and stealing large volumes of sensitive data. The 41-year-old unnamed individual was apprehended Monday morning at his home in Craiova, Romania, by the Romanian […]

Clop Gang Partners Laundered $500 Million in Ransomware Payments

The cybercrime ring that was apprehended last week in connection with Clop (aka Cl0p) ransomware attacks against dozens of companies in the last few months helped launder money totaling $500 million for several malicious actors through a plethora of illegal activities. “The group — also known as FANCYCAT — has been running multiple criminal activities: […]

Feds Secretly Ran a Fake Encrypted Chat App and Busted Over 800 Criminals

In an unprecedented sting operation, the U.S. Federal Bureau of Investigation (FBI) and Australian Federal Police (AFP) ran an encrypted chat service called ANoM for nearly three years to intercept 27 million messages exchanged between criminal gang members globally. Dubbed Operation Ironside (AFP), Operation Greenlight (Europol), and Operation Trojan Shield (FBI), the long-term covert probe […]

How Can You Protect Your Data?

In the world of digital technology, almost everything is on the internet, including your personal data. If this falls into the wrong hands, it can lead to financial and personal losses. So, here is a list on how can you protect your data and avoid being a victim of cybercriminals. How Can You Protect Your […]

The Role of a vCISO in Enterprise Security

Cybercriminals try to find all ways to circumvent security solutions and the defensive measures adopted by organizations, and hence it is always important that business organizations have dedicated professionals to take care of cybersecurity. It’s often the CISO (Chief Information Security Officer) who is in charge of cybersecurity for most organizations. But in today’s context, […]

Instagram Tests Changes to Help Users Recover Hacked Accounts

Following an innumerable number of complaints, Instagram has started testing new methods to recover hacked accounts. Hackers have been targeting many high-profiled Instagram accounts and there was a wave of complaints related to such incidents. High-profile accounts, like those of lifestyle and fitness influencers, were hacked. The hackers would execute the attack via phishing emails […]

Gaming Industry An Attractive Target For Cybercriminals

The gaming industry, in general, is aware that attempts to login and other forms credential abuse is a problem. But maybe not as aware that they should be. According to a new Akamai report, hackers are using new methods to evade detection. Many organizations do not follow the scope and complexity of the problem of […]

Telegram Recovers from DDoS Attack

Telegram Messenger, which had suffered a DDoS (Distributed Denial of Service) attack recently, has reportedly recovered from the same and everything now seems stabilized, as per reports. A ZDNet report, dated June 13, 2019, says, “Telegram Messenger has recovered from a distributed denial of service (DDoS) attack that hit its platform on Wednesday, telling its […]

Microsoft Warns Users About Ongoing Email Spam Campaign

Microsoft warns users about an ongoing email spam campaign that abuses an Office vulnerability and seems to target European users. The malware, it is reported, is spread through infected RTF documents attached to emails. ZDNet reports, “Microsoft’s security researchers have issued a warning on Friday afternoon about an ongoing spam wave that is spreading emails […]

Corporate IT Security Starts With Simple Policies

Frequent readers of hackercombat.com should be fully aware by now that cybercriminals of all sizes mean serious business. The old days of script kiddies vandalizing a website or pulling off a publicity stunt for their 15-minute of fame online are a rare occurrence these days. Cybercriminals are enticed by the real plausibility of profiting from […]

Tips to Increase Your Bitcoin Security

Of all the cryptocurrencies available today, Bitcoin definitely is the most popular one. Investors are attracted by the potential value of this cryptocurrency. But let’s remember that whatever gets popular on the internet draws the attention of cybercriminals as well. Thus, Bitcoin, because of its popularity and also because of its potential value, does attract […]

Banking Trojan Infections Dominated In Q1 2019

Kaspersky Lab, the research arm of Kaspersky, an antivirus vendor has revealed that the first quarter of 2019 saw the double growth of banking trojan cases globally compared to the last quarter of 2018. Cybercriminals have switched their focus on banking trojan after the shutdown of the very popular Coinhive cryptojacking service last March 2019. […]

Criminals Hack Forum Used for Trading Stolen Credentials

This is really interesting- a popular online forum that hackers have been using to trade stolen credentials has been hacked! Reports confirm that OGusers, a popular online form used by hackers to trade stolen account credentials, has been hacked and that this had caused sensitive personal data of many users to be exposed. Brian Krebs […]

Discussing Common Security Mistakes and Misconfigurations

We should never be under the impression that it’s the big blunders committed by users and enterprises that lead to big security incidents. It’s sometimes the little mistakes and very minor misconfigurations, mostly those missteps that could be easily avoided, that lead to big security incidents and data breaches. Companies are devastated, huge reputation damages […]

Malaysia Continues to Lure Cybercriminals: Report

As per the findings of a recent report, Malaysia still continues to attract cybercriminals despite businesses stepping up cybersecurity measures and tending to capitalize on the latest security intelligence. In the 24th edition of its Security Intelligence Report (SIR), Microsoft reveals such findings relating to the cyber landscape in Malaysia. SIR, which is based on […]

Belkin Wemo Insight Smart Plug Vulnerability Remains Exploitable

If you own a smart home, then you may probably be aware of Belkin Wemo Insight smart plug. Yes, it helps you to turn off your lights and appliances, and you can also monitor them from anywhere. We are trying to highlight how the plug has been vulnerable for over a year, and a fix […]

RatVermin Spyware Campaign: Ukraine Gov Agencies Targeted

A phishing campaign in which Ukraine government agencies are targeted with the RatVermin malware has been uncovered. Security researchers working with FireEye Threat Intelligence have uncovered this ongoing spear phishing campaign that has been targeting the Ukraine government and military with emails that aim to distribute the RatVermin malware, which helps malicious actors in info-gathering […]

Things To Do To Defend Against Spear Phishing

  Phishing is a way to extract confidential data from individuals and businesses. Mostly by creating fake Web pages or send emails to disclose login names, passwords, credit card information, etc. Once cybercriminals have the data that they are looking for, they can easily steal money and personal information from the poor victims. Cybercriminals also […]

The Basics Of Security Drupal CMS

Drupal is considered as a professional-level Content Management System (CMS), with advanced features than Joomla, WordPress, Sharepoint, and Magento. Just like other software, it requires updates and careful maintenance of the web developers and web admins. It is not easy, but doable, hence we provide in this article simple tasks the web admins can do […]

Penetration Testing The Most Visible Component of Cyber Security

Amid all of the high-profile data breaches, of all sizes have been successfully targeted by hackers who employ a wide range of different strategies. Companies have had to learn about the potential cost of a data breach. It has to be noted that all companies have top-tier security measures and professionals yet they were compromised. […]

Elements Of A Well Researched Phishing Attempt

Phishers for decades have honed their skills of persuasion, that is why the art of fooling people through an Internet-messaging method is a huge business by cybercriminals. There is money to be earned by collecting personally identifiable information, either sell them to 3rd parties or use it for extortion and blackmail, especially if the victims […]