Skip to content
securitysifu

SecuritySifu

CyberSecurity And Emerging Technology
securitysifu
  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds

Category: DarkNet

King iPhone Hacker NSO Group Robbed By Employee -- Spyware On Dark Web Sale For $50 Million, Israel Claims
DarkNet Security

King iPhone Hacker NSO Group Robbed By Employee — Spyware On Dark Web Sale For $50 Million, Israel Claims

21/12/2020 No Comments appleiosiphonemalwarespywaresurveillance

As well as becoming something of a bête noire of privacy and human rights activists, Israel’s NSO Group has established itself as one of the…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More King iPhone Hacker NSO Group Robbed By Employee — Spyware On Dark Web Sale For $50 Million, Israel Claims
179 Arrested for Darknet Drug Trafficking
DarkNet

179 Arrested for Darknet Drug Trafficking

23/09/2020 No Comments anonymityanonymouscybercrimedarknettor

A global sting operation targeting drug trafficking on the darknet has led to 179 arrests and the seizure of weapons, drugs, and millions of dollars…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More 179 Arrested for Darknet Drug Trafficking
Darknet Moderator Jailed for 11 Years
DarkNet

Darknet Moderator Jailed for 11 Years

04/09/2020 No Comments bitcoindarknetfbi

An American who was employed to moderate disputes on an illegal darknet marketplace has been sentenced to 11 years in prison. Bryan Connor Herrell, of Aurora,…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Darknet Moderator Jailed for 11 Years
Complete Personal Fraud Kits Sell for Less Than $40 on Dark Web
DarkNet Security

Complete Personal Fraud Kits Sell for Less Than $40 on Dark Web

25/08/2020 No Comments darkwebfraudpii

The low cost of records reflects the huge supply of PII after many breaches at hospitals, government agencies, and credit bureaus. When a complete set…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Complete Personal Fraud Kits Sell for Less Than $40 on Dark Web
7 Ways the Hidden World of the Darknet Is Evolving
DarkNet

7 Ways the Hidden World of the Darknet Is Evolving

14/07/2020 No Comments cyberthreatdarknetdarkwebdeepweb

The darknet isn’t as hidden as it used to be. The seamy digital underbelly of the internet, according to some sources, may be shrinking or entering the…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More 7 Ways the Hidden World of the Darknet Is Evolving
Hacker leaks database of dark web hosting provider
DarkNet Security

Hacker leaks database of dark web hosting provider

01/06/2020 No Comments anonymousbreachdatabasehackhashpassword

A hacker has leaked online today the database of Daniel’s Hosting (DH), the largest free web hosting provider for dark web services. The leaked data…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Hacker leaks database of dark web hosting provider
Dark Web Becomes a Haven for Targeted Hits
DarkNet Security

Dark Web Becomes a Haven for Targeted Hits

05/04/2020 No Comments agilecyber attackcybercrimedevopsmalware

Malware on the Dark Web is increasingly being customized to target specific organizations and executives. Malicious services offered on the Dark Web are more like…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Dark Web Becomes a Haven for Targeted Hits
Source code of Dharma ransomware pops up for sale on hacking forums
DarkNet Security

Source code of Dharma ransomware pops up for sale on hacking forums

30/03/2020 No Comments codeemailencryptionfbihackerkeymalwareransomwarespam

The source code of a major ransomware strain named Dharma has been put up for sale on two Russian hacker forums over the weekend. The…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Source code of Dharma ransomware pops up for sale on hacking forums
Analysis: Drugs on Social Media vs. the Dark Web
DarkNet

Analysis: Drugs on Social Media vs. the Dark Web

16/02/2020 No Comments darkwebsocial media

Social media and darknet sites have replaced traditional systems as the most preferred vehicles of drug sales. The growth of advanced technology has gone hand…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Analysis: Drugs on Social Media vs. the Dark Web
DOJ charges Ohio man with laundering over $300 million via bitcoin
Blockchain DarkNet

DOJ charges Ohio man with laundering over $300 million via bitcoin

14/02/2020 No Comments bitcoincryptocurrencydarknetdarkweb

Federal authorities arrested an Ohio man for operating a cryptocurrency laundering service that moved some $300 million in bitcoin via a “tumbling” operation. Larry Dean…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More DOJ charges Ohio man with laundering over $300 million via bitcoin

Posts navigation

Page 1 Page 2 Next page

RSS Feeds

  • SBI customers targeted by phishing scam, say cyber security firms
  • What modern cybersecurity can learn from ancient adversaries
  • Cyber Security Of Security Services Market Regional Growth Overview, Development Data by Key ...
  • Key Cybersecurity Challenges for 2021
  • Oxfam Australia confirms 'supporter' data accessed in cyber attack
  • Cybercrime's Dark Triad
  • Globe rolls out network virtualisation platform, strengthens SD-WAN play
  • Risk Analytics Firm Qomplx to Go Public Via Casper CEO SPAC
  • Cyber security expert discusses potential for Oklahoma water hacks
  • Financial Regulators Eye Stricter Cybersecurity Incident Reporting Standards

Recent Vulnerabilities

Is Koo an Alternative to Twitter or a New Path for Cyber Criminals? – EC-Council Blog

03/03/2021 No Comments
What can you do about the 'unfixable' exploit affecting almost every iPhone and iPad?

What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?

03/10/2019 No Comments
Nearly 60% of businesses suffered a data breach in the past 3 years

Nearly 60% of businesses suffered a data breach in the past 3 years

03/10/2019 No Comments
Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

04/10/2019 No Comments
APAC firms will need AI as speed increasingly critical in cyberdefence

APAC firms will need AI as speed increasingly critical in cyberdefence

07/10/2019 No Comments
No comments found.
0day 2fa 4g abuse access control account admin adware aerospace agile ai amazon analytics android anonymity anonymous antivirus api app apple application security appsec apt art artificial intelligence assessment atm attachment attack audit authentication automation autonomous vehicles autopilot aws azure backdoor backup bcp bgp big data biometric bitcoin block blockchain blue team bluekeep bluetooth bot botnet breach breached browser brute force bug bug bounty business business continuity business impact byod camera capsule network cars casino censor cert certificate china chipset chrome cia cio cisco ciso click fraud cloud cnc code code signing compliance container cookie corona covid-19 crack credential stuffing credentials credit card crime critical infrastructure crypto cryptocurrency cryptography cryptojacking cryptomining currency cve cvss cyber cyber attack cyber defense cyber espionage cyber insurance cyber resilience cyberattack cybercrime cybersecurity cyberthreat cyberwarfare cylance darknet darkweb data data breach data leak database ddos debug decryption deepfake deepweb defcon detection devops devsecops diabetes dictionary attack digital digital forensics digital signature disaster recovery diy dkim dmarc dns docker domain doos dos dr e-commerce ecommerce edge computing email emotet encryption encryption keys enigma equifax espionage eternalblue ethereum european union exif exploit extortion facebook facial recognition fake fbi fileless firefox firewall forensics framework fraud ftp fuzzing gdpr git github gmail goldbrute google governance gps grc hack hacked hacker hacktivism hacktivist hash hijack hipaa honeypot hosting hsm https huawei hybrid cloud iam ibm ics identity incident incident handling incident management incident response india industrial control system information security infrastructure injection insider threat instagram insurance intel intelligence internet ioc ios iot ip ipad iphone isms iso iso 27001 iso27000 isp jailbreak kasperksy Kaspersky key keylogger kgb kubernetes law lawsuit leak legal libra linux lock lte mac machine learning malvertising malware managed security medical devices meltdown mfa microprocessor microsoft military mimikatz mirai misconfiguration mitm mitre mobile mobile app mongodb monitor mozilla mssp multi cloud music nasa netcat network nfc nosql notepad notpetya nsa office open source openssl operating system owasp password patch payment pdf penetration test personal information pgp phishing phone php pii pin plugin policy ponzi porn power grid powershell privacy private keys privilege access program programmer protection proxy python quantum ransomware raspberry pi rat rce rdp red team remote code execution response risk router rsa russia s3 saas satellite scada scam script security security awareness self driving car server serverless sextortion sha shell side channel skim smart city smart device smart home smart tv smartphone sms sniff soc social engineering social media software spam spear phishing spectre spf spoof spy spyware sql sqlite ssh ssl standard startup steganography storage stuxnet supply chain surveillance tcp teamviewer telegram tesla testing threat tls token tor trend trojan unix usa usb video virus vmware voice voip vpn vulnerability waf wannacry web website whatsapp whitehat wi-fi wifi wikileaks windows wipro wireless wordpress worm xss yubikey zero day zero trust zoom

Recent Posts

  • Is Koo an Alternative to Twitter or a New Path for Cyber Criminals? – EC-Council Blog
  • Why 2021 Will Be The Year Of Adaptive Cybersecurity – Forbes
  • SolarWinds: How Russian spies hacked the Justice, State, Treasury, Energy and Commerce Departments – CBS News
  • Could this Utah proposal quash lawsuits from victims of data breaches? – Deseret News
  • As cyberattacks peak, so does the demand for Profero’s services – CTech

Trending

saas hacktivism honeypot pin insurance bug rce teamviewer microsoft atm spy netcat edge computing ibm forensics gdpr notepad wordpress mozilla spf
Follow Us

Search…

  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds
SecuritySifu | © Copyright All right reserved
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.