Security manufacturer SonicWall has issued an urgency notice on threat actors abusing zero-day vulnerability in their Secure Mobile Access (SMA) [...]
Category: News
The Microsoft Remote Desktop Protocol service is a built-in Windows service running on TCP/3389 and/or UDP/3389 that enables authenticated remote [...]
Microsoft has shared new details on how hackers behind the SolarWinds breach managed to remain undetected by hiding their activity [...]
Malwarebytes CEO Marcin Kleczynski stated that while they don't use SolarWinds, they also got targeted in the recent attack. After [...]
The logic bugs that attackers used in the past were discovered by Google Project Zero security manager Natalie Silvanovich in [...]
The new Windows 10 bug causes the system to crash with BSOD by opening a certain path in the browser [...]
The recent campaign targeting organizations in Russia and Hong Kong have been linked to Winnti (or APT41) by cybersecurity researchers. [...]
The Finger command is a utility that allows a local user to get a list of users on a remote [...]
Zerologon is a critical security flaw tracked as CVE-2020-1472, which allows attackers to elevate privileges to the domain administrator and [...]
The controversial macOS feature that allowed 53 Apple apps to bypass firewalls and VPNs installed by users got removed. The [...]
According to the MalwareHunterTeam security researcher, a big number of verified Twitter accounts got hacked to promote a fake Elon [...]
Project Zero, Google's zero-day bug-hunting team has discovered a campaign coordinated by a highly sophisticated actor, targeting Windows and Android [...]
Microsoft Defender vulnerability, actively exploited in the wild by threat actors, has been patched by Microsoft. The vulnerability tracked as [...]
A website SolarLeaks dot net is selling the data stolen from the companies, suffered from the SolarWinds breach, the attack [...]
A Cryptocurrency mining malware OSAMiner has been known since 2015, but researchers have trouble analyzing it because payloads are exported [...]
The Great Suspender is a popular and useful Chrome extension, designed to improve the Google Chrome usage of RAM by [...]
The source code for the ChasityLock ransomware has become publicly available for research purposes after the attack that targeted male [...]
The US Cybersecurity and Infrastructure Security Agency (CISA) has stated that the hackers behind the SolarWinds attack has used password [...]
The entire collection of Nissan North America source code got leaked because of the exposed Git server, protected with default [...]
According to AT&T Alien Labs report, multiple malware authors are using Ezuri crypter to improve the antidetection of their malware. [...]
Recent WhatsApp Privacy Policy update has faced its users with an ultimatum, either they accept sharing their data with Facebook, [...]
Recent leak of Microsoft's Windows Core Polaris has proofed a series of rumors about Microsoft developing an OS for low [...]
Google Chrome has fixed a bug that caused Windows 10 antivirus to lock the newly created files, by not allowing [...]
Zyxel has released a patch, fixing a critical vulnerability, tracked as CVE-2020-29583, concerning a hardcoded undocumented secret account, that could [...]
The new tool named Sparrow released by the Cybersecurity and Infrastructure Security Agency (CISA) as an answer to the recent [...]
A new type of malware using Word files with macros to download a PowerShell script from GitHub, has been discovered [...]
SolarWinds has suffered a cyberattack, which made attackers capable of modifying a legitimate SolarWinds Orion BusinessLayer DLL file to include [...]
Cybersecurity company CrowdStrike was warned by Microsoft team that hackers tried to read the company's emails using a compromised Microsoft [...]
Ultra Low Latency mode allows frames to be submitted into the render queue before GPU needs them, which helps to [...]
Signal is one of the most popular highly encrypted messaging apps, especially valued by people who want to protect their [...]
The vulnerability CVE-2020-0986 was exploited as a zero-day in May and was presumably fixed since then, however, the security researchers [...]
SUPERNOVA is a webshell planted in the code of the Orion network and apps monitoring the platform, enabling adversaries to [...]
IBM Trusteer researchers have uncovered a massive fraud operation that leveraged a network of mobile device emulators to steal millions [...]
Gitpaste-12 is a recently discovered worm botnet, that was known to host malicious payload on Pastebin and was spreading using [...]
A recent attack via trojanized update for SolarWinds network was not the first successful attempt on compromising U.S. internal network [...]
Google, Apple, Microsoft and Mozilla has agreed to ban MitM certificate, used by Kazakhstan government to spy on their citizens [...]
Threat actors used dropper to deploy RAT (remote access trojan) on a compromised store websites, that are used to regain [...]
Malware-laced extensions, found by Avast Threat Intelligence researchers and disguised as a helper add-ons for Instagram, Facebook and Vimeo have [...]
Recent FireEye report has revealed that Russian-state sponsored hackers breached SolarWinds and added malicious code to Windows DLL file used [...]
SystemBC was first discovered in 2018 and was previously used in several campaigns in 2019 as a virtual private network, [...]