Attackers threaten to collapse users’ mining platforms Network security and ethical hacking specialists from the International Institute of Cyber Security report the...
Malicious hackers have infected some torrents on this platform with a malware functional in Windows operating systems Although in general this practice...
Most people think that there’s little if any, Mac malware in the civilized world. Unfortunately, that impression is just wishful thinking. Well,...
This new and sophisticated malicious software is able to bypass the best security measures A new ransomware family discovered at the beginning...
The coordinated efforts were part of the URLhaus initiative that Abuse.ch launched in March 2018, and whose primary objective is to collect...
A new ransomware called Phobos is infecting devices and networks in a massive way A group of hackers is finding remote access...
DarkHydruns APT Group targets government entities in the middle eats with weaponized excel documents that delivers a new variant of RogueRobin trojan...
Piratebay users are now being victimized by malware and phishing attack that hijacking the websites and steal the cryptocurrencies. A researcher who...
The worst alliance of Ransomware and the CryptoMiner family in a spread spree, early January 2019. Malware Spam or MalSpam is the...
Researchers discovered 2 Malicious Android apps from Google Play Store that drops Anubis banking malware with highly obfustication techniques. The malicious apps...
A chrome extension that still available on Chrome Web Store steals the payment card information from website forms visited by the users....
The application made online transactions executed in the background A team of network security experts detected a suspiciously high number of online...
The company argues that its insurance does not cover damage caused “by Acts of war” According to network security and ethical hacking...
An official Alcatel app, available through Google Play Store, has been found to be malware infected. It’s in a pre-installed weather app...
The Goldluck malware has been around for more than a year. The malware basically gave hackers privileges which allowed them to send...
USB-IF announced USB Type-C Authentication Program to confirm the authencity of the USB device USB device, USB cable or USB charger. The...
The cloud computing services company suffered an attack with malicious software known as Ryuk that crippled its activities During the past Christmas...
A new landscape study states that an upcoming mobile devices may comes with per-installed mobile malware along with malicious code in it....
Did malware disrupt newspaper deliveries in major US cities? Here’s what’s known about the incident so far and the leading suspect: Ryuk...
A disk wiping Shamoon malware performing destructive attack sample using an image of a burning US Dollar. This malware was uploaded in...
A new type of ransomware has been infecting servers over unsecured IPMI cards Cybersecurity and ethical hacking specialists from the International Institute...