According to the report by French cybersecurity agency ANSSI, Russian hackers have successfully managed to exploit Centreon Software to infiltrate [...]
Telegram's 'Secret chat' feature offers increased privacy than the standard chats. Security researcher Dhiraj Mishra has discovered a vulnerability in [...]
TrickBot's BazarBackdoor has been actively distributed through spam campaigns. BazarBackdoor allows hackers to get remote access to the computer to spread [...]
Google has addressed zero-day vulnerability for Chrome version 88.0.4324.150 that has been actively exploited recently. The vulnerability has been tracked [...]
Pro-Ocean is a new cryptojacking malware by Rocke hackers with self-spreading capabilities, that can blindly throw exploits at discovered vulnerable [...]
DPRK group named 'Zinc' or 'Lazarus' has been targeting vulnerability researchers according to Microsoft. According to Microsoft research, the group [...]
According to Google's Threat Analysis Group report, a North Korean government-backed hacking group is targeting security researchers, attempting to infect [...]
Sophos researchers have investigated the brute-force attacks on MSSQL servers with the intent to compromise them and install crypto-mining malware [...]
The Microsoft Remote Desktop Protocol service is a built-in Windows service running on TCP/3389 and/or UDP/3389 that enables authenticated remote [...]