Sophos researchers have investigated the brute-force attacks on MSSQL servers with the intent to compromise them and install crypto-mining malware [...]
Author: Mash

Security manufacturer SonicWall has issued an urgency notice on threat actors abusing zero-day vulnerability in their Secure Mobile Access (SMA) [...]

The Microsoft Remote Desktop Protocol service is a built-in Windows service running on TCP/3389 and/or UDP/3389 that enables authenticated remote [...]

Microsoft has shared new details on how hackers behind the SolarWinds breach managed to remain undetected by hiding their activity [...]

Malwarebytes CEO Marcin Kleczynski stated that while they don't use SolarWinds, they also got targeted in the recent attack. After [...]

The logic bugs that attackers used in the past were discovered by Google Project Zero security manager Natalie Silvanovich in [...]
The new Windows 10 bug causes the system to crash with BSOD by opening a certain path in the browser [...]

The recent campaign targeting organizations in Russia and Hong Kong have been linked to Winnti (or APT41) by cybersecurity researchers. [...]
The Finger command is a utility that allows a local user to get a list of users on a remote [...]

Zerologon is a critical security flaw tracked as CVE-2020-1472, which allows attackers to elevate privileges to the domain administrator and [...]
The controversial macOS feature that allowed 53 Apple apps to bypass firewalls and VPNs installed by users got removed. The [...]

According to the MalwareHunterTeam security researcher, a big number of verified Twitter accounts got hacked to promote a fake Elon [...]

Project Zero, Google's zero-day bug-hunting team has discovered a campaign coordinated by a highly sophisticated actor, targeting Windows and Android [...]

Microsoft Defender vulnerability, actively exploited in the wild by threat actors, has been patched by Microsoft. The vulnerability tracked as [...]

A website SolarLeaks dot net is selling the data stolen from the companies, suffered from the SolarWinds breach, the attack [...]

Romanian cybersecurity company Bitdefender has released a free decryptor for the DarkSide ransomware, allowing victims to recover their files without [...]

A Cryptocurrency mining malware OSAMiner has been known since 2015, but researchers have trouble analyzing it because payloads are exported [...]

The Great Suspender is a popular and useful Chrome extension, designed to improve the Google Chrome usage of RAM by [...]

The source code for the ChasityLock ransomware has become publicly available for research purposes after the attack that targeted male [...]

The US Cybersecurity and Infrastructure Security Agency (CISA) has stated that the hackers behind the SolarWinds attack has used password [...]

The entire collection of Nissan North America source code got leaked because of the exposed Git server, protected with default [...]

According to AT&T Alien Labs report, multiple malware authors are using Ezuri crypter to improve the antidetection of their malware. [...]

Recent WhatsApp Privacy Policy update has faced its users with an ultimatum, either they accept sharing their data with Facebook, [...]

Recent leak of Microsoft's Windows Core Polaris has proofed a series of rumors about Microsoft developing an OS for low [...]

Google Chrome has fixed a bug that caused Windows 10 antivirus to lock the newly created files, by not allowing [...]

Zyxel has released a patch, fixing a critical vulnerability, tracked as CVE-2020-29583, concerning a hardcoded undocumented secret account, that could [...]
Adobe has stopped supporting their Flash Player on January 1, 2021. Adobe will not be posting any updates to Flash [...]

The new tool named Sparrow released by the Cybersecurity and Infrastructure Security Agency (CISA) as an answer to the recent [...]

A new type of malware using Word files with macros to download a PowerShell script from GitHub, has been discovered [...]

SolarWinds has suffered a cyberattack, which made attackers capable of modifying a legitimate SolarWinds Orion BusinessLayer DLL file to include [...]

Cybersecurity company CrowdStrike was warned by Microsoft team that hackers tried to read the company's emails using a compromised Microsoft [...]

Ultra Low Latency mode allows frames to be submitted into the render queue before GPU needs them, which helps to [...]

Signal is one of the most popular highly encrypted messaging apps, especially valued by people who want to protect their [...]

The vulnerability CVE-2020-0986 was exploited as a zero-day in May and was presumably fixed since then, however, the security researchers [...]
The investigation over Solarwinds is still ongoing, and the most recent discovery, coming from the cybersecurity firm Truesec, includes the [...]

SUPERNOVA is a webshell planted in the code of the Orion network and apps monitoring the platform, enabling adversaries to [...]

IBM Trusteer researchers have uncovered a massive fraud operation that leveraged a network of mobile device emulators to steal millions [...]

Gitpaste-12 is a recently discovered worm botnet, that was known to host malicious payload on Pastebin and was spreading using [...]

A recent attack via trojanized update for SolarWinds network was not the first successful attempt on compromising U.S. internal network [...]

Google, Apple, Microsoft and Mozilla has agreed to ban MitM certificate, used by Kazakhstan government to spy on their citizens [...]
