HackDig : Dig high-quality web security articles for hacker

UK politicians’ login credentials up for sale in the dark web

Russians hackers are offering for sale on the dark web login credentials of thousands of top UK politicians, top officials, and diplomats. According to The Times, Russians hackers are selling on the dark web login credentials of thousands of top UK politicians, top officials, and diplomats. Journalists at the British newspaper have found two huge lists of st
Publish At:2017-06-24 01:30 | Read:212 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web dara breach D

MACSPY – Remote Access Trojan as a service on Dark web

Reporters for the online service “Bleeping Computer” have uncovered a new threat to Apple being offered on the dark web, it is the MACSPY RAT. Reporters for the online service “Bleeping Computer” have uncovered a new threat to Apple being offered on the dark web. Thru their efforts the researchers for AlienVault were able to obtain a
Publish At:2017-06-14 20:30 | Read:335 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Malware Dark Web MACSPY m

Analyzing the attack landscape of the Dark Web. There is no honor among thieves.

Security researchers at Trend Micro used Tor honeypots to conduct a six-months study of the attack landscape of the Dark Web, Security experts at Trend Micro have conducted a six-months study of the attack landscape of the Dark Web, researchers operated a honeypot setup simulating several underground services on the Dark Web in order to analyze the way they
Publish At:2017-06-12 13:15 | Read:316 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Cybercrime Dark W

MacRansom: The first Mac ransomware offered as a RaaS Service

Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware researchers at security firm Fortinet have spotted a new strain of ransomware dubbed MacRansom that targets Mac machines. The malware is available with Ransomware-as-a-service (RaaS) model through a hidden service in the TOR
Publish At:2017-06-12 13:15 | Read:240 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Malware Crime-as-

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after the massive WannaCry attack the French authorities seized a server running two Tor relays in connection to the ransomware campaign, both relays were also working as Tor entry guard nodes, key components of Tor routing w
Publish At:2017-06-11 18:50 | Read:260 | Comments:0 | Tags:Breaking News Deep Web Malware critical infrastructure Cyber

New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and Unix domain sockets. The Tor Project has released the stable release of Tor Browser 7.0 that includes many security features and according to the development team, it also improved performance. The Tor network implements an anonymous c
Publish At:2017-06-09 11:35 | Read:327 | Comments:0 | Tags:Breaking News Deep Web Security anonymity Dark Web Hacking T

Dark Web users of a child porn website tracked after visiting file sharing site

The U.S. Department of Homeland Security has identified dark web users after they downloaded media through a file sharing services. The DHS obtained the IP addresses of several suspects that visited a child porn site hosted in the Tor network. According to court filings, the suspects shared links to password-protected child pornography media on the  Zii
Publish At:2017-06-01 12:20 | Read:293 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Child porn Cybercrime Dar

Red on Red: The Attack Landscape of the Dark Web

We’ve frequently talked about how limited-access networks such as the Dark Web is home to various cybercriminal underground hotspots. Hosted and accessed via the Tor network, these sites house underground marketplaces that sell various good and services, which include cryptocurrency laundering, hosting platforms for malware, and stolen/counterfeit identities
Publish At:2017-05-30 11:35 | Read:164 | Comments:0 | Tags:Deep Web

Zomato Data breach – Nearly 17 million usernames and hashed passwords stolen

Nearly 17 million Zomato usernames and hashed passwords have been stolen by hackers., the company suspects it is an insider’s job. Nearly 17 million Zomato usernames and hashed passwords have been stolen by hackers. Zomato is the Indian largest online restaurant guide, the company confirmed data breach announcing that hackers have stolen accounts deta
Publish At:2017-05-18 16:45 | Read:370 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web Hacking Cyber

European law enforcement takes down Darknet marketplace

Europol supported the Slovak NAKA crime unit in an operation that resulted in the seizure of the Bloomsfield darknet marketplace. Another success of the European police, last week Europol supported the Slovak NAKA crime unit in the arrest of a Slovak national believed to operate the Bloomsfield darknet marketplace dealing in drugs and arms. “Bloomsfiel
Publish At:2017-05-08 04:40 | Read:284 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Bloomsfield Cybercrime Da

Graph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silos

A group of researchers conducted a study on the Dark Web leveraging the Graph theory. This hidden space appears as composed by sparse and isolated silos. A group of experts from the Massachusetts Institute of Technology’s SMART lab in Singapore has recently published an interesting research paper on the Dark Web. The researchers collected and analyzed
Publish At:2017-05-02 01:40 | Read:221 | Comments:0 | Tags:Breaking News Deep Web Hacking

The Deep Web: Myths And Truths You Need To Know

Every now and then the media comes up with a sensational story about the Deep Web. Often these tales are shocking and frightening – but are they true? What is the Dark Web and Deep Web? Before going further, we need to understand what the Deep Web actually is – fortunately the concept is much easier than you might think. Any web page that you can locate from
Publish At:2017-04-27 12:00 | Read:289 | Comments:0 | Tags:Mobile News News dark web deep web Internet tor

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

Security firm Flashpoint published an interesting paper titled, ‘Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies‘ about cybercriminal communications of threat actors. A recent research by the threat intelligence firm Flashpoint has uncovered how malicious threat actors communicate to share information between them. The r
Publish At:2017-04-21 17:25 | Read:247 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web anonimity Cybercrime Cybe

Karmen Ransomware, a cheap RaaS service that implements anti-analysis features

Experts at Recorded Future have discovered a cheap RaaS, the Karmen Ransomware that deletes decryptor if detects a sandbox. Security experts from threat intelligence firm Recorded Future have spotted a new ransomware as a service (RaaS) called Karmen. The service allows customers to easy create their ransomware campaign in a few steps and without specific sk
Publish At:2017-04-18 15:45 | Read:405 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Malware Cybercrime Dark W

Are you searching for stolen US University email credentials? Search on the Dark Web

According to a new research published by the nonprofit DCA, millions of stolen US University email credentials are available for sale on the Dark Web. According to a new research published by the nonprofit Digital Citizens Alliance (DCA) that searched the Dark Web for credentials from the top 300 US universities, millions of stolen email credentials are av
Publish At:2017-03-30 16:00 | Read:390 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web black markets

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud