Browsing category

Cyber Attack

A Hacker Hijacked Chrome Extension To Push Malware

Phish creators have recently come across an extension for Google chrome extension to push malware after compromising the Chrome Web Store account of German software developers a9t9 and abused to distribute spam messages to users who are not accusing. Nicknamed Copyfish, Chrome Extension To Push Malware which allows users to extract text from images, PDF, […]

Google Detected Dangerous Lipizzan Spyware Apps On Play Store

Google security researchers have discovered a new deceptive Android Lipizzan spyware software family can steal a lot of user information, including text messages, emails, voice calls, photos, location data, and other files and spy. Nicknamed lipizzans, Android Lipizzan spyware seems to be developed by Equus Technologies, an Israeli company that Google indicated as a computer vendor in […]

CowerSnail Is Windows Backdoor From Creators Of Sambacry Linux Malware

CowerSnail Last month, a group of hackers who exploited SambaCry, a 7-year vulnerability in remote code execution in Samba network software to hack into Linux and install encryption malware- CowerSnail, was reported. The same group of hackers now run Windows machines with a new backdoor, which is a re-compiled version based on the same malicious […]

Gang Behind Fireball Malware That Infected Millions Of PCs Busted By Police

Chinese authorities have recently launched an offensive against operators of a massive campaign of advertising programs fireball Malware that has infected about 250 million computers, including Windows and Mac OS, the world earlier this year. The adware campaign was discovered by security researchers at Check Point last month after it has infected more than 25 […]

Beware! Apple Users,Undetectable Malware Targeting Mac Computers

Yes, even Mac could have viruses that could spy on their users silently. So if you have a Mac and think it is immune to malware, you’re wrong. An Undetectable Malware Targeting Mac Computers. An unusual piece of malware that can take remote control of the webcam, screen, mouse, keyboards and install other malicious software this […]

Security Researchers Reveal Cyber Espionage Attacks By Copykittens Hackers

Security researchers have discovered a new and massive cyber espionage campaign by copykittens hackers, especially aimed at people working in government organizations, defense, and academics from various countries. The campaign is conducted by a group of Iran-related threats whose activity, methods of attack and targets have been published in a detailed joint report published by […]

A Hacker Stole Millions From Veritaseum (Ethereum platform)

Veritaseum Ethereum platform confirmed today that a hacker was able to steal millions of $ 8.4 from the ICO Ethereum (Coin Initial Offers) platform. The anonymous hacker was able to steal true chips during the ICO. Because the ICO was running and the chips were in demand, the hacker immediately sold to other buyers. “ICOs […]

New LeakerLocker Ransomware Send Your Internet History & Pics to All Your Friends

After episodes of WannaCry and Petya ransomware, a new LeakerLocker ransomware (but creative) is spreading through special applications from the Google Play Store, this time aimed at Android Android users. Nicknamed LeakerLocker, LeakerLocker ransomware in Android does not encrypt files on the victim’s device, unlike traditional ransomware, but secretly collects personal pictures, messages and browsing […]

Reliance Jio Sim Data Breach Customer’s Data Allegedly Hacked

Reliance Jio Sim Data Breach, Personal data of about 120 million customers were reported exposed on the Internet probably the largest personal data breach in India. Last night, an independent website called Magicapk.com went online, offering Reliance Jio customers to find your (Know Your Customer or KYC) identity simply by typing in their Jio number. […]

Millions Of Android Devices Infected By CopyCat Malware Around The World

A new malware called CopyCat malware hit more than 14 million Android devices around the world, rooting phones and kidnapping applications to make millions in fraudulent advertising revenue. “Copycat is a mobile malware for Android devices that use the technology to make fraudulent advertisements. As a result of infection, the root user’s device, allowing attackers […]

SQL Injection Vulnerability Found In WordPress Plugin Used By 300,000+ Sites

SQL Injection Vulnerability Found in WordPress plugin, WP Statistics is one of the most popular WordPress plugins installed on 300,000 websites. The WordPress plugin makes it possible for administrators to monitor the statistics of the WordPress site without relying on external services and uses were attributed the data whenever possible to respect the privacy of […]

Linux PC Can Be Hacked Remotely With Malicious DNS Response

A critical loophole has been discovered in SystemD, the popular first character system and service manager for Linux operating systems, which can allow remote attackers to tolerate a buffer overflow to run malicious code on their choice through DNS response machines. Thus, Linux PC can be hacked remotely with malicious DNS response. The vulnerability, called CVE-2017-9445, […]

Petya Ransomware Is Actually A Malware, You Won’t Get Your Files Back

Is Petya ransomware defective or too smart? Petya Ransomware is a nasty piece of malware that, unlike other traditional ransomware, does not encrypt files on a target system, one by one. Instead, Petya restarts victim computers and encrypts the hard disk master file (MFT), disabling the master boot record (MBR), limiting access to the entire […]

Just Like Wannacry, Petya Ransomware Is Spreading Worldwide

In the new ransom attack (Petya Ransomware) is currently attacking a large number of countries all over the world, including Ukraine, the UK, India, the Netherlands, Spain, Denmark and much more. Used to grab a new ransom Contact details [email protected] requires a $ 300 payment in your home. Malware is spreading rapidly using the same […]

UK Parliament Hit by Cyberattack Hackers attempted to access MP emails

UK Parliament Hit by Cyberattack Hackers attempted to access MP emails, gentlemen and staff and security services are to stop access for anyone not in Westminster as part of efforts to ensure that the network later in the attack, which Is sponsored by the alleged state time. A spokesman for the parliament and told the media […]

Data of 200 Million Voters Compromised On Unsecured Server

Information Has exposed Data of 200 Million Voters Compromised On Unsecured Server and more than 60% of the US population to what is considered the largest exhibition is known to voters. This error was caused by deep-root analytics (DRA), a data analysis company used by the Republican National Committee of the United States (RNC), which […]

DeltaCharlie – A North Korean DDoS Botnet Malware Warned By US

The US government issued a warning about a rare piracy operation going on in North Korea last eight years. He presented the joint FBI report and the Homeland Security Department details on the US “DeltaCharlie”, a malicious program used by the Hidden Cobra group of piracy to infect hundreds of thousands of computers across the […]

Beware!Hundreds Of Google Play Store Apps Affected By Xavier Malware

Over 800 different Android apps downloaded millions of times from the Google Play store, which was infected with a malicious ad library (Xavier Malware) that silently collects sensitive user data and can perform dangerous operations. Trend Micro security researchers recently found a Trojan robot called Ad Xavier (identified by ANDROIDOS_XAVIER.AXM), the malware takes and filters […]

Warning! Hackers Are Now Using ‘SambaCry Vulnerability’ To Hack Linux

SambaCry uses weaknesses in Samba’s facilities to make Linux machine concessions and use them as victims in the process of extracting decoded currency (or Monero Bitcoin or any other currency) also allows the remote attacker to hack the relevant Linux systems. SambaCry said in a safety notice: “All versions of Samba 3.5.0 vulnerable to a […]

A New Social Media Attack Called “DoubleSwitch” Is Being Used By Hackers

Security researchers have discovered a new intelligent way (DoubleSwitch) currently used by attackers to take over Twitter accounts verified and rename famous people for spreading false news. The fact is that social networks when used strategically over time is the most powerful form of marketing and market research that the world has seen but sharing […]