Twitter adds HTTPS support by default
On Monday, Twitter announced that it’s introducing support for secure HTTPS connections to all users by default. More details: Last year, we added the option to always use HTTPS when accessing...
View ArticleHow cybercriminals monetize malware-infected hosts
The vibrant cybercrime underground ecosystem offers countless ways to monetize the malware-infected hosts at the disposal of the malicious attacker. From converting them to anonymization proxies...
View ArticleSpamvertised ‘YouTube Video Approved’ and ‘Twitter Support” themed emails...
Just like true marketers interested in improving the click-through rates of their campaign, pharmaceutical scammers are constantly looking for new ways to attract traffic to their fraudulent sites....
View ArticleNew Russian service sells access to compromised social networking accounts
On daily basis, hundreds of thousands of legitimate accounts across multiple social networks get compromised, to be later on abused as a platform for launching related cyber attacks and social...
View ArticleCybercriminals target Twitter, spread thousands of exploits and malware...
Twitter users, beware! Over the past several days, cybercriminals have been persistently spamvertising thousands of exploits and malware serving links across the most popular micro blogging service....
View ArticleHacked Origin, Uplay, Hulu Plus, Netflix, Spotify, Skype, Twitter, Instagram,...
Aiming to capitalize on the multi-billion gaming market, cybercriminals actively data mine their botnets for accounting credentials, not just for popular gaming platforms, but also the actual...
View ArticleThreatVlog Episode 3: NYT, Twitter, and HuffPost hacked by Syrian Electronic...
In this episode of ThreatVlog, Grayson Milbourne covers the information behind the Syrian Electronic Army’s hacking of New York Times, Twitter, and Huffington Post. Grayson includes a breakdown of the...
View ArticleNewly launched E-shop offers access to hundreds of thousands of compromised...
In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented...
View ArticleHow cybercriminals efficiently violate YouTube, Facebook, Twitter, Instagram,...
With social media, now an inseparable part of the marketing expenditures for every modern organization, cybercriminals quickly adapted to the ongoing buzz, and over the last couple of years, have been...
View ArticleSony’s PSN Network Haymaker’d by DDoS Attack; Exec’s Plane Grounded Over Bomb...
Sony had a rough weekend. And not just Sony; last weekend wasn’t the best time to be a gamer. Here’s the skinny… Early yesterday morning, Sony’s PlayStation Network (PSN for short) was hit with a...
View ArticleThreatVlog Episode 3: NYT, Twitter, and HuffPost hacked by Syrian Electronic...
In this episode of ThreatVlog, Grayson Milbourne covers the information behind the Syrian Electronic Army’s hacking of New York Times, Twitter, and Huffington Post. Grayson includes a breakdown of the...
View ArticleNewly launched E-shop offers access to hundreds of thousands of compromised...
In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented...
View ArticleHow cybercriminals efficiently violate YouTube, Facebook, Twitter, Instagram,...
With social media, now an inseparable part of the marketing expenditures for every modern organization, cybercriminals quickly adapted to the ongoing buzz, and over the last couple of years, have been...
View ArticleSony’s PSN Network Haymaker’d by DDoS Attack; Exec’s Plane Grounded Over Bomb...
Sony had a rough weekend. And not just Sony; last weekend wasn’t the best time to be a gamer. Here’s the skinny… Early yesterday morning, Sony’s PlayStation Network (PSN for short) was hit with a...
View ArticleThreatVlog Episode 3: NYT, Twitter, and HuffPost hacked by Syrian Electronic...
In this episode of ThreatVlog, Grayson Milbourne covers the information behind the Syrian Electronic Army’s hacking of New York Times, Twitter, and Huffington Post. Grayson includes a breakdown of the...
View ArticleNewly launched E-shop offers access to hundreds of thousands of compromised...
In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented...
View ArticleHow cybercriminals efficiently violate YouTube, Facebook, Twitter, Instagram,...
With social media, now an inseparable part of the marketing expenditures for every modern organization, cybercriminals quickly adapted to the ongoing buzz, and over the last couple of years, have been...
View ArticleSony’s PSN Network Haymaker’d by DDoS Attack; Exec’s Plane Grounded Over Bomb...
Sony had a rough weekend. And not just Sony; last weekend wasn’t the best time to be a gamer. Here’s the skinny… Early yesterday morning, Sony’s PlayStation Network (PSN for short) was hit with a...
View ArticleThreatVlog Episode 3: NYT, Twitter, and HuffPost hacked by Syrian Electronic...
In this episode of ThreatVlog, Grayson Milbourne covers the information behind the Syrian Electronic Army’s hacking of New York Times, Twitter, and Huffington Post. Grayson includes a breakdown of the...
View ArticleNewly launched E-shop offers access to hundreds of thousands of compromised...
In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented...
View Article
More Pages to Explore .....