HackDig : Dig high-quality web security articles for hacker

Tor launches Bug Bounty Program, hackers can earn between $2,000 and $4,000 for high severity flaws

The Tor Project announced the launch of a public bug bounty program. Bug hunters can earn between $2,000 and $4,000 for high severity flaws. It’s official, the Tor Project announced the launch of a public bug bounty program through the HackerOne platform, the initiative was possible with support from the Open Technology Fund. “With support from t
Publish At:2017-07-20 22:05 | Read:681 | Comments:0 | Tags:Breaking News Deep Web Digital ID Hacking anonymity privacy

What’s new after the AlphaBay Market Shutdown in the darkweb?

Authorities shut down Alphabay, wondering which will be the marketplace that will reach the top and which will be the impact on the criminal ecosystem? AlphaBay was shut down by law enforcement and the alleged mastermind committed suicide in jail while waiting for the extradition to the US. The event will have a significant impact on the cyber criminal under
Publish At:2017-07-17 01:55 | Read:856 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web AlphaBay Market Black mar

AlphaBay Market was shut down by the law enforcement, alleged mastermind committed suicide in jail

The AlphaBay Market was shut down by the law enforcement, exactly like its predecessor Silk Road, and the alleged mastermind committed suicide in jail. AlphaBay Market was considered the largest marketplace on the Dark Web for drugs, guns, and other illegal goods competing against the likes of Abraxas, Dream, and Hansa. The AlphaBay Market went down last we
Publish At:2017-07-14 18:40 | Read:797 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web AlphaBay Market Black mar

Katyusha Scanner, a new SQLi Vulnerability Scanner Available for $500 in the underground

Katyusha Scanner is a new fully automated SQLi vulnerability scanner discovered by researchers at security firm Recorded Future. Recorded Future security researchers have discovered a fully automated SQLi vulnerability scanner, dubbed Katyusha Scanner, on a hacking forum. The tool is offered for sale for just $500, it allows mass scans, simply managed from a
Publish At:2017-07-14 00:15 | Read:1156 | Comments:0 | Tags:APT Breaking News Cyber Crime Deep Web Hacking Vulnerability

European police shut down the Elysium website, a major child porn platform

German police, in a joint operation with other law enforcement agencies, have shut down one of the major Dark Web child pornography site, the ‘Elysium website.’ German police have shut down one of the major Dark Web child pornography websites, the ‘Elysium.’ The Elysium website had more than 87,000 members, most of the users were from
Publish At:2017-07-09 09:50 | Read:1038 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Cybercrime Darkweb Elysiu

UK Police: Accessing the Darkweb could be a sign of terrorism

In a leaflet distributed by the UK authorities, the police tell citizens to be vigilant on anyone using the darkweb. The widespread of terrorism in Europe has been very severe recently. As a way of effectively dealing with In a wake of recent terror attacks, London authorities are conducting various initiatives to fight the threat. The police arrested severa
Publish At:2017-07-08 15:25 | Read:862 | Comments:0 | Tags:Breaking News Deep Web Terrorism cyber unit darknet Darkweb

AlphaBay Market, one of the largest Dark Web marketplaces is down. Is it an Exit-Scam?

The AlphaBay Market went down Tuesday night without any explanation, many users that have purchased products on the marketplace fear the Exit-Scam. The news is shocking, the AlphaBay Market, one of the largest Dark Web black markets is down. We have analyzed many times the popular black market where it was possible to buy any kind of illegal goods, including
Publish At:2017-07-06 08:10 | Read:945 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web anonymity AphaBay black m

FBI hacked a US Darknet shopper who tried to purchase Mail Bomb

The FBI hacked the system of a dark web user who tried to purchase a mail bomb from an undercover investigator in the US. According to a plea agreement, filed on April 28, 2017, Clinton Scott Bass of Georgia (US) tried in a first time to purchase a car bomb. The man, who was using two different pseudo names, contacted an undercover FBI agent on a darknet mar
Publish At:2017-07-02 12:06 | Read:897 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Laws and regulati

Shifr RaaS lets create a simple ransomware with just 3 steps

Over the weekend, security experts discovered a new Ransomware-as-a-Service dubbed Shifr RaaS that allows creating a ransomware compiling 3 form fields. Ransomware represents a profitable business for crooks, it is normal that the offer of Ransomware-as-a-Service (RaaS) will continue its success in the cyber criminal ecosystem. Over the weekend, several secu
Publish At:2017-06-28 16:00 | Read:558 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Malware Cybercrime Dark W

UK politicians’ login credentials up for sale in the dark web

Russians hackers are offering for sale on the dark web login credentials of thousands of top UK politicians, top officials, and diplomats. According to The Times, Russians hackers are selling on the dark web login credentials of thousands of top UK politicians, top officials, and diplomats. Journalists at the British newspaper have found two huge lists of st
Publish At:2017-06-24 01:30 | Read:991 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web dara breach D

MACSPY – Remote Access Trojan as a service on Dark web

Reporters for the online service “Bleeping Computer” have uncovered a new threat to Apple being offered on the dark web, it is the MACSPY RAT. Reporters for the online service “Bleeping Computer” have uncovered a new threat to Apple being offered on the dark web. Thru their efforts the researchers for AlienVault were able to obtain a
Publish At:2017-06-14 20:30 | Read:945 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Malware Dark Web MACSPY m

Analyzing the attack landscape of the Dark Web. There is no honor among thieves.

Security researchers at Trend Micro used Tor honeypots to conduct a six-months study of the attack landscape of the Dark Web, Security experts at Trend Micro have conducted a six-months study of the attack landscape of the Dark Web, researchers operated a honeypot setup simulating several underground services on the Dark Web in order to analyze the way they
Publish At:2017-06-12 13:15 | Read:787 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Cybercrime Dark W

MacRansom: The first Mac ransomware offered as a RaaS Service

Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware researchers at security firm Fortinet have spotted a new strain of ransomware dubbed MacRansom that targets Mac machines. The malware is available with Ransomware-as-a-service (RaaS) model through a hidden service in the TOR
Publish At:2017-06-12 13:15 | Read:712 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Malware Crime-as-

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after the massive WannaCry attack the French authorities seized a server running two Tor relays in connection to the ransomware campaign, both relays were also working as Tor entry guard nodes, key components of Tor routing w
Publish At:2017-06-11 18:50 | Read:656 | Comments:0 | Tags:Breaking News Deep Web Malware critical infrastructure Cyber

New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and Unix domain sockets. The Tor Project has released the stable release of Tor Browser 7.0 that includes many security features and according to the development team, it also improved performance. The Tor network implements an anonymous c
Publish At:2017-06-09 11:35 | Read:1330 | Comments:0 | Tags:Breaking News Deep Web Security anonymity Dark Web Hacking T

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud