Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Cybercrime

AppSec…

Emotet The Banking Trojan

11 Apr 201924 Jul 2020
Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it’s evolved to become a major threat to users everywhere. Let’s talk…
Cryptography…

The Darknet 2019

7 Apr 201924 Jul 2020
Do you want to access the update about deep web links or, the hidden wiki, Deep web sites, Dark web Search, The Dark Web Links, tor onion links, tor hidden wiki links, deep web sites…
Attacks…

500 Million Marriott Guest Records Stolen

30 Nov 20188 Dec 2018
The world's biggest hotel chain Marriott International today disclosed that unknown hackers compromised guest reservation database its subsidiary Starwood hotels and walked away with personal details of about 500 million…
#Metasploit…

Payload in PDF

12 Nov 2018
Infected PDFs have always been a privileged way to infect users because this document format is very common and used by almost everyone. Moreover, it exists many ways to exploit Acrobat Reader…
AppSec…

A Guide to Not Getting Hacked

20 Nov 20175 Mar 2019
Hackers steal hundreds of millions of passwords in one swoop and occasionally cause large-scale blackouts. The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks, smart home robots that could kill…
Crypto Currency…

Hacker Allegedly Steals $7.4 Million in Ethereum

18 Jul 201718 Jul 2017
Someone tricked would be investors during an ethereum ICO into sending their cryptocurrency to the wrong address. A hacker has allegedly just stolen around $7.4 million dollars worth of ether, the…
Android Security…

How the CopyCat malware infected Android devices around the world

7 Jul 20177 Jul 2017
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in…
Cyber Security…

The Rise Of Ransomware

8 Apr 20168 Apr 2016
Ransomware is a type of malware that prevents or limits users from accessing their systems - this type of malware forces the victims to pay the ransom through online payment…
Cybercrime

Petya ransomware leverages Dropbox

29 Mar 201629 Mar 2016
Trend Micro researchers spotted a new ransomware variant dubbed Petya that is delivered to victims who believe they are linking to a resume stored on a cloud storage site like…
Cybercrime

Ransomware Now Part Of Massive Spam Attack

19 Mar 201619 Mar 2016
Researchers are tracking a massive spam campaign pelting inboxes with Locky ransomware downloaders in the form of JavaScript attachments. The huge spike, reported by security firm Trustwave, represents an extraordinary…
Cybercrime…

Threats To Your Security When Using Social Media

29 Feb 201629 Feb 2016
Social networking has changed the way we interact with friends and associates. While social networks, like Facebook, Twitter, YouTube, FourSquare, and Google+, play a significant role in our lives, they…
Cybercrime

WhatsApp Scam Drops Malware on Your Device

8 Feb 20168 Feb 2016
Watch out for latest WhatsApp scam tricking users into opening malware link sent by ”friends” The favorite app of all youngsters and adults alike, WhatsApp, has come under the hammer…
Attacks…

DDoS Attacks Create Smokescreens for Larceny

7 Oct 2015
Distributed denial of service attacks have evolved from protest tool to criminal weapon. More than one in three DDoS attacks are used to plant malware or a virus on company…
Cybercrime…

Russian hacker Vladimir Drinkman pleads guilty in New Jersey court

17 Sep 201522 Sep 2015
Russian national Vladimir Drinkman, who was arrested in Amsterdam in 2012 and brought to the United States to be charged for his involvement in the biggest data breach, pleaded guilty…
Cybercrime…

The 10 Most Notorious Hacking Groups of All Time

16 Sep 20155 Jul 2018
Want to get caught up real quick on the history of hacking? This article on the 10 most notorious hacking groups of all time will help you. Don't forget to…
Cybercrime…

Akamai warns of increased activity from DDoS extortion group

11 Sep 201515 Sep 2015
Akamai's Prolexic Security Engineering & Research Team (PLXsert) is warning of increased activity by a group – known as DD4BC – that since 2014 has typically threatened to take down corporate…
Attacks…

Android porn app takes a selfie and demands $500 ransom

8 Sep 201515 Sep 2015
A PORNOGRAPHY APPLICATION is posing a problem by taking photographs and using them as part of a blackmail scheme, according to insecurity firm Zscaler. Wow, that does sound inconvenient. We…
Attacks…

Coder pleads guilty to writing Gozi banking trojan

8 Sep 20158 Sep 2015
A man credited with helping to create the infamous Gozi banking malware has pleaded guilty in a US court. Deniss Calovskis, 30, of Latvia was arrested in November 2012 and…
Attacks…

China Police Arrest 15,000 Suspects for Alleged Cyber Crimes

7 Sep 20157 Sep 2015
China Police has arrested nearly 15,000 people on suspicion of cyber crimes as part of an operation dubbed "Cleaning the Internet," according to reports. According to the Chinese Ministry of…
Attacks…

Employees put business data at risk by installing gambling apps on their phones

6 Sep 20156 Sep 2015
If you work for a large, global company, chances are some of your peers have installed gambling apps on the mobile devices they use for work, and that's bad news…
Cybercrime

The era of cybercrime: Why businesses must learn how to protect their online systems

2 Sep 20154 Sep 2015
In 2014 we were witness to a massive rise in cyber crime and critical security bugs. This year unfortunately the problem continues to rise and is getting more and more…

RSS ls -a /Zer0Days

  • [webapps] pfBlockerNG 2.1.4_26 - Remote Code Execution (RCE) 20 Feb 2023
  • [remote] SmartRG Router SR510n 2.6.13 - Remote Code Execution 11 Nov 2022
  • [webapps] CVAT 2.0 - Server Side Request Forgery 11 Nov 2022
  • [local] IOTransfer V4 - Unquoted Service Path 11 Nov 2022
  • [remote] AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal 11 Nov 2022

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,439 other subscribers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

dark92i (@dark92i) on The Hidden Wiki
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Best Darkweb Links
    Best Darkweb Links
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Payload in PDF
    Payload in PDF
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Import VirtualBox Images to GNS3
    Import VirtualBox Images to GNS3
  • How to install WebGoat on Ubuntu
    How to install WebGoat on Ubuntu
  • CSRF Code Examples and Defense
    CSRF Code Examples and Defense
  • Install DVWA on Ubuntu AWS
    Install DVWA on Ubuntu AWS

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 270 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar