The group is a successor to BlackEnergy and a subset of the TeleBots gang–and its activity is potentially a prelude to a much more destructive attack.

Source

image
By Carolina If you want to increase conversions and sales, a good place to start is to make it as easy as possible for them to pay for your services or products. If your checkout page isn’t easy to use, it won’t matter how good your products or services are. Your checkout page is where they get […] This is a post from HackRead.com Read the original post: How to Make the Payment Process Easy for Online Customers

Source

image
By Carolina Cheat developers are constantly under the radar of Take-Two Interactive and Rockstar Games. Both companies have previously taken legal action against cheat developers for protecting their games including the very popular Grand Theft Auto V (GTA V). Last month, they launched an operation against Australian developers, who had released a well-known mod-menu cheat for GTA […] This is a post from HackRead.com Read the original post: Authorities search & seize properties of GTA V's “Infamous” cheat developers

Source

Tumblr today published a report admitting the presence of a security vulnerability in its website that could have allowed hackers to steal login credentials and other private information for users' accounts.

The affected information included users email addresses, protected (hashed and salted) account passwords, self-reported location (a feature no longer available), previously used email

Source

image
By Waqas After BlackEnergy, critical infrastructure around the world is among key targets of the new malware called GreyEnergy. In its recent research, ESET has revealed details of a new group of cybercriminals dubbed as GreyEnergy, which seems to be the replacement of BlackEnergy APT group. The BlackEnergy group’s last activity was observed in December 2015 when […] This is a post from HackRead.com Read the original post: GreyEnergy: New malware targeting energy sector with espionage

Source

What are utility and power companies, and federal agencies, doing to ready themselves for potential ransomware attacks? Threatpost discusses.

Source

A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison.

According to a press release published Monday by U.S. Attorney’s Office, Colton Grubbs, who used online moniker ‘KFC Watermelon,' was pleaded guilty for three counts–unlawfully accessing

Source