A new campaign that delivers malicious PDF file that leads to download the file malicious APK file to the user’s device. Quick...
Security researchers discovered 15 malicious wallpaper apps that running Ad Fraud Scheme from Google play store and current these apps downloaded 222,200...
Most Destructive IoT malware Mirai now being delivered as Miori and its spreading via dangerous remote code execution exploits. Mirai malware has...
Several malware variants showed significant growth this year According to cybersecurity specialists from the International Institute of Cyber Security, the amount of...
A new version of the destructive malware dubbed Shamoon V3 targeting European oil and gas company in Middle East and Asia. Shamoon...
Microsoft launches Malware Detection Competition with AI to test whether the participants AI malware detection models can accurately predict malware from the...
Researchers recently observed that cyber criminals using a weaponized memes in order to communicate with malware for various malicious operations. Memes are...
Cyber Criminals from TA505 group started a new campaign that targeting retail, grocery, and restaurant chains by distributing weaponized MS word documents....
The Cape Cod Community College suffered a massive cyber attack, the attackers steal college banking information and allegedly transfer $807,130 from College....
GandCrab ransomware currently distributing via Blackmail Email that claims “users data have been compromised and threaten to expose their private data in...
DanaBot Banking Trojan came out with new features which harvest email addresses from the victim’s mailbox and send out spam emails. This...
ESET research shows that DanaBot operators have been expanding the malware’s scope and possibly cooperating with another criminal group
APT group widely exploiting the new Adobe flash 0day vulnerability via MS word document and the vulnerability allows attackers to execute the...
A new malware variant has been discovered in China; this malicious program has infected over 100k devices in less than a week...
ESET researchers discovered a set of previously undocumented Linux malware families based on OpenSSH. In the white paper, “The Dark Side of...
New research reveals that Universal Plug and Play (UPnP) implemented 277,000 Connected Devices are vulnerable to malicious proxy system UPnProxy , a dubbed EternalSilence NSA hacking...
Cyber Security manages business risk during the full cycle(monitor, assess, advise, re-mediate). It fights against the cybercrime: detection of attacks and fraud...
Researchers observed a new Powershell based backdoor via Microsoft office document that infects similar to MuddyWater threat actor hacking tools to steal...
Trickbot, a Banking Trojan that involved various cyber attacks especially target the banking networks, now distributing to target the POS services and...
Emotet starts another massive spam campaign just as the shopping season picks up steam
Some Mac apps are so persistent that you can’t use traditional methods to remove them. Even if you do, there will always...