FireEye has discovered a widespread campaign, tracked as UNC2452. The campaign started this Spring and is targeting organizations across the [...]
Category: News
Molerats hacking group was noticed to use the fresh version of the SharpStage malware, relying on Dropbox, Google Drive, and [...]
Some of the modern ads are known to be intrusive and to use a lot of system resources, being able [...]
Subway UK has stated that a hacked system used for marketing campaigns is responsible for the malware phishing emails sent [...]
Chrome 88 will feature Manifest V3 support for the Declarative Net Request API, which brings a number of restrictions to [...]
This Thursday Facebook revealed the true identity of APT32 group, as an answer to them using the platform to spread [...]
Qbot is a banking trojan used by threat actors to steal banking credentials and personal information. The new method that [...]
Microsoft issued guidance on mitigation of the DNS cache poisoning bug, exploiting which allows threat actors to use modified DNS [...]
The National Security Agency (NSA) has stated a warning about Russian hackers exploiting recently patched VMware vulnerability. NSA didn't publicly [...]
According to Microsoft's recent blog post, Windows Feature Experience Packs will be used to quickly deliver improvements and bug fixes [...]
MetaMask has a community of over a million users, that offers an Ethereum wallet via browser extension that lets distributed [...]
Recently discovered new web skimming malware is capable to disguise itself as social media buttons to inject the payment card [...]
E-Land retail operates several retail clothing stores, such as New Core and NC Department Store. Last month E-Land Retail has [...]
DeathStalker group, previously known as Deceptikons, is a long-time active threat actor, known for using a large variety of malware [...]
DarkIRC botnet is actively exploiting the vulnerability tracked as CVE-2020-14882 to target a large number of exposed Oracle WebLogic servers. [...]
Gootkit Trojan is Javascript-based malware, that gets remote access for threat actors alongside other malicious actions, such as password and [...]
Vietnamese hacker group tracked as Bismuth, better known as APT32 and OceanLotus, has increased its activity and made some changes [...]
The currently active Office 365 phishing campaign for stealing credentials is reported to have a huge infrastructure, combining several Oracle [...]
Black Friday is here and brought a lot of great deals, including the antiviral software deals. These discounts only work [...]
Security researchers are warning users about the new malware family WAPDropper that currently targets mobile users to subscribe them to [...]
The apps with fake modpacks are made to lure kids, looking to modify their Minecraft experience. Those fake modpacks don't [...]
Windows 10 October 2020 Update also known as 20H2 has brought a decent amount of improvements but still features a [...]
According to a VPNMentor security report, a database exposed on the Internet contained 300 million username and password combos that [...]
A list of one-line exploits with the purpose of stealing VPN credentials from Fortinet VPN devices has been posted yesterday. [...]
TrickBot is a well-known malware family, commonly distributed via phishing emails and other malware. After the installation, TrickBot downloads a [...]
Despite the recent release of several Windows 10 updates, the bug causing Windows Defrag to Trim non-SSD devices still hasn't [...]
Over the past week, several researchers have spotted a new phishing campaign called LightBot, which was normally used to distribute [...]
A critical bug in Facebook Messenger for Android has been fixed. The bug made users able to listen to other [...]
Chinese state-sponsored hacking group known as APT has infected more than 200 systems across the Southeast Asia region over the [...]
Egregor ransomware uses a fresh approach to increase public awareness of the attack to pressure the victim into paying - [...]
One of the Windows 10 security features is using specialized chips called Trusted Platform Modules (TPMs) that provide hardware-based protection. [...]
Chrome 87, released by Google on the 17th of November 2020, has brought a number of performance and security improvements. [...]
In an attempt to hold back zoombombing (unauthorized users being able to join the conferences with the goal of disrupting [...]
Microsoft is testing a new feature designed to advertised Microsoft Edge to new users during the Windows 10 setup process. [...]
When browsing webpages, with the new Apple iOS browser feature, users will be able to select and share a part [...]
A recent Windows 10 update caused a mysterious BSOD error named PDC_WATCHDOG_TIMEOUT to appear and to stop devices from boosting [...]
Jupyter malware, made by a group of Russian speaking hackers, is used to steal the data from the various software [...]
A new email tool called Email Appender widely advertised on the cybercriminal forum provides a stealthy method for attacks by [...]
A new malware named ModPipe that is targeting Oracle Micros Hospitality RES 3700 point-of-sale systems has been discovered recently. ModPipe [...]
Google has announced a change in storing photos and documents - there will be a cap to the overall storage. [...]