Capcom has disclosed the details on the investigation of the ransomware attack the company suffered last year. Threat actor hit [...]
Category: News
Malware distributors are rotating payloads, switching IceID with QBot malware. Both of those are banking trojans that are often used [...]
The malicious package is called "web-browserify", and it imitates the popular npm component Browserify. The package contains of a manifest [...]
Security researcher Rajvardhan Agarwal released a working proof-of-concept (PoC) exploit for a remote code execution vulnerability for the V8 JavaScript [...]
Zoom Zero-day vulnerability has been disclosed by security researchers during the Pwn2Own contest, which is a contest for cybersecurity professionals [...]
An archive containing scraped data of 500 million LinkedIn users has been put for sale on a popular hacking forum, [...]
Hackers from North Korean hacking group Lazarus are using their new malware dubbed Vyveva to attack South African freight logistics [...]
Google Chrome now blocks HTTPS, HTTP, and FTP access to TCP port 10080 to prevent ports from being abused in [...]
Researchers at Check Point Research (CPR) have discovered the malware on Google's Play Store disguised as an app named FlixOnline, [...]
Gigaset is a German manufacturer of telecommunications devices, including a series of smartphones running the Android operating system. Starting on [...]
Security researchers have uncovered the data about the banking trojan dubbed Janeleiro, which has been active since 2019, targeting corporate [...]
Two days ago threat actor released personal information of 533,313,128 Facebook users on a hacking forum including name, gender, location, [...]
Certain apps, including well-known ones, have been historically collecting data about other apps on user's devices. An academic study posted [...]
The Joint Cybersecurity Advisory (CSA) published today by the FBI and CISA warns administrators and users of APT (advanced persistent [...]
Coinhive was an in-browser crypto mining platform that allowed websites to inject JavaScript code into websites to mine Monero cryptocurrency [...]
The malware BazarCall has been distributed by fake call centers since January 2021. Threat actors use that malware to install [...]
New malware with extensive spyware capabilities spies on users through infected Android devices. The spyware triggers when the data is [...]
The vulnerability tracked as CVE-2021-1879 was discovered in the Webkit browser engine and allowed hackers to launch cross-site scripting attacks. [...]
Regular cyberattacks introduce JavaScript into the website to redirect users to malicious sites, exploit vulnerabilities, and steal user's submitted data, [...]
ClearURLs is a browser extension that automatically removes tracking elements from URLs, which according to the developer, helps to protect [...]
Purple Fox malware that was previously distributed by phishing emails has added a worm module to its list of capabilties [...]
Google's zero-day bug-hunting team Project Zero reports that the hacking group launched several campaigns targeting Windows, iOS, Android throughout 2020, [...]
REvil ransomware now has 'Windows Safe Mode' encryption mode - the ransomware can encrypt files in Windows Safe Mode to [...]
Acer is a Taiwanese electronics and computer maker specializing in laptops, desktops, and monitors. The company has been hit by [...]
The Cybersecurity and Infrastructure Security Agency (CISA) has created a new tool to detect SolarWinds malicious activity in enterprise environments. [...]
XcodeSpy malware targets iOS devs and install macOS backdoor on the victim's device. Xcode is a development environment created by [...]
Security researcher David Buchanan has demonstrated a method of storing MP3 and ZIP data inside the Twitter image. The 6 [...]
Recently Microsoft has disclosed four vulnerabilities that are actively used together in attacks against Microsoft Exchange. Those vulnerabilities are now [...]
Microsoft has provided a temporary fix for the bug that causes Windows 10 to crash when printing. The bug appears [...]
Microsoft's known strategy to aggressively advertise their new features with pop-up ads is back, and even ad blockers can't do [...]
The operators of Lemon_Duck, a cryptomining botnet targeting enterprise networks, are now using Microsoft Exchange Proxylogon exploits in their attacks. [...]
According to Intezer security researchers, a previously undocumented backdoor malware RedXOR with links to Chinese hacking groups is used in [...]
OVH data centers have been destroyed by fire in a major incident. OVH is the third-largest provider in the world, [...]
On March 2nd Microsoft released an emergency security update to fix four ProxyLogon vulnerabilities that were actively used in attacks [...]
Microsoft has revealed the data on malware that SolarWinds hackers deployed as the second-stage payloads. Three new malware strains are [...]
FireEye has discovered a sophisticated backdoor malware on the servers of the organization that got compromised in SolarWinds supply-chain attack. [...]
Cybersecurity company Qualys has suffered a data breach due to the exploitation of the zero-day vulnerability in their Accellion FTA [...]
Microsoft has fixed four actively exploited zero-day bugs for Microsoft Exchange. Those four vulnerabilities allowed attackers to gain access to [...]
Google's oday bug-hunting team Project Zero has shared a proof-of-concept (PoC) exploit code for a critical RCE (Remote Code Execution) [...]
Windows 10 'Sun Valley' UI refresh also known as version 21H2 update is reportedly coming to Windows systems in the [...]