Tag: Operators
-
Four Evil Ransomware Operators Sentenced For Hacking Enterprises
Artem Zayets, Aleksey Malozemov, Daniil Puzyrevsky, and Ruslan Khansvyarov have been found guilty of illegally circulating means of …
-
Google Thwarts Over 10,000 Attempts by Chinese Influence Operator
Google blocked over 10,000 instances of Dragon Bridge activity in Q1 2024, a China-affiliated influence operator that pushes pro-People’s …
-
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom operators …
-
Ebury Botnet Operators Diversify with Financial and Crypto Theft
Ebury, one of the most advanced server-side malware campaigns, has been active for 15 years but its use by threat actors is still growing, …
-
Bitcoin Fog Operator Convicted for Stealing Over $400M
D.C., has convicted Roman Sterlingov, a dual Russian-Swedish national, for operating the notorious darknet cryptocurrency mixer, Bitcoin …
-
US Dismantled Sophisticated Warzone RAT, Key Operators Arrested
This international effort targeted a service known as “Warzone RAT,” a powerful tool cybercriminals use to remotely access and steal …
-
xDedic Marketplace Admin and Operators Arrested
In a landmark victory for cybersecurity, the xDedic Marketplace, a notorious haven for cybercrime, has been shut down. This international …
-
Easy Steps To Port Your Mobile Number To A Different Operator
Mobile Number Portability (MNP) is a service that allows mobile users to switch from one operator to another while keeping their existing …
-
Major Cyber Attack Paralyzes Kyivstar – Ukraine’s Largest Telecom Operator
Ukraine’s biggest telecom operator Kyivstar has become the victim of a cyber attack, disrupting customer access to mobile and internet …
-
Ukraine’s Largest Phone Operator Hack Tied War With Russia
Kyivstar, Ukraine’s leading mobile network operator, is experiencing a significant shutdown allegedly due to a cyber-attack. The company, …
-
Phishing Operators Make Ready Use of Abandoned Websites for Bait
Abandoned sites — like Wordpress — are easy to break into, offer a legitimate looking cover, and can remain active for longer than …
●●●