Benefits and Best Practices of Adaptive Security

The Process of Investigating Cyber Crimes

Cybercrime is any criminal activity where the object as a target and/or tool is a computer or network device. Some cyber crimes directly attack computers or other devices to disable…

Read More
Adwind Spyware as a Service Utility Grid Operators Attacks 1

Adwind Spyware-as-a-Service Utility Grid Operators Attacks

A phishing campaign for grid operators uses a PDF attachment to offer spyware. A campaign aimed at a domestic grid infrastructure that spoofs a PDF attachment to deliver Adwind spyware….

Read More
Open EDR
GermanWiper A Diabolical Ransomware Targeting German PC Users

GermanWiper, A Diabolical Ransomware Targeting German PC Users

Have you heard of GermanWiper? No, it is not a brand of shaving razor or tissue paper in Germany. The name is very unfortunate, but it is another “ransomware” that…

Read More
Cyber Attacks From The Point Of View Of Financial Enterprise

Cyber Attacks From The Point Of View Of Financial Enterprise

As we have repeatedly mentioned here in Hackercombat.com, hackers today are no longer interested in digital vandalism against systems and websites. Showing how good you are in cracking and hacking…

Read More
Tax Filing Deadlines And Issue Of Increased Phishing Attempts 1

Tax Filing Deadlines And Issue Of Increased Phishing Attempts

As the tax filing deadline is almost upon many taxpayers, the cybercriminal groups have launched their aggressive campaign to capture this potential income stream. Banking trojans that were installed in…

Read More
5 Bad “Features” Not To Look For In A CMS Software

5 Bad “Features” Not To Look For In A CMS Software

The Content Management System market is very competitive these days, with a partial list of all CMS softwares that exist can be seen in a Wikipedia page. Whether the web…

Read More
Scamvertisers using Botnets and Public Servers for Hire Charged in New York

Scamvertisers using Botnets and Public Servers for Hire, Charged in New York

The United States Department of Justice has found probable cause to prosecute the alleged online scamvertising involving eight Russian nationals. The scamvertising schemes were separately named as 3ve and Methbot,…

Read More
Data

Seven Steps to Data Loss Prevention

It is not that only large enterprise should worry about Data Loss Prevention because now even small companies of all sizes are the target for hackers. Having a DLP in…

Read More
Google Target Hit by Twitter Bitcoin Scam Account Hacks 1

Google, Target Hit by Twitter Bitcoin Scam Account Hacks

Google and Target, the U.S retail giant, were hit recently by the ongoing Twitter bitcoin scam account hacks. It was seen that the official Twitter accounts of Google and Target carried posts…

Read More
Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM

Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM

Cybercriminals have devised a new way of hacking cardless ATMs using SMS-based phishing attacks. It has become a new trend with many financial institutions to offer cardless ATM transactions, thereby…

Read More

Page 1 of 5

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register