Recover your encrypted files with this free tool A tool recently launched by experts in cybersecurity and digital forensics allows you to...
An unpatched bug that abusing Microsoft word Online Video future that allow an attacker to deliver malicious files into the victim’s system....
Researchers discovered a new malware that abusing two legitimate windows files and use it against compromised victims to steal sensitive information. One...
According to experts, many municipalities attacked with ransomware do not have many options when facing such an incident The city of West...
Cyber criminals distributing new Android malware via Phishing email campaign that turns infected smartphones into hidden mobile proxies. This malicious app installing...
The malicious apps have all been removed from the official Android store but not before the apps were installed by almost 30,000...
Shadow Brokers Hacking Group’s new administrative module Tool called DarkPulsar Leaks with persistance backdoor to provide remote control to the attackers. There...
An advanced persistent threat (APT) actor group known by several different names such as Tick, Redbaldknight and Bronze Butler carried out a...
Customers see their admin credentials stolen and their servers infected with Linux/ChachaDDoS
The tool allowed access to the victims’ computers without their consent A 21-year-old man living in Kentucky, who had previously plead himself...
Cybercriminals Advertising Godzilla Loader Malware for $500 on Dark web forums, the malware found actively maintained and getting new updates periodically. Godzilla...
Three of the most destructive incidents seen in modern cybersecurity are the work of the same APT The Last year occurred the...
Third-party developers abusing Microsoft Apps store & publish fake Google Photos App under the Google LLC name but it is originally an...
Newly discovered fake flash updates malware pushing XMRing Cryptocurrency miners along with borrowing the original Adobe installer flash updater notification. Recent campaigns are...
Cybercriminals abuse Googlebot servers to deliver malicious payloads in new campaign Last year, a malware campaign used Google Adwords and Google Sites...
The cloud portal of Xiongmai left opened a backdoor to its servers Another Internet of Things (IoT) device provider has been discovered...
A cryptocurrency mining malware is disguised as a Flash update that appears to be legitimate, warn researchers Cryptomining popularity exploded in 2017...
A new previously unknown hacking group appeared as Gallmaker attacking various public sectors such a government, military, and defense using custom malware. Attacker...
Cybercriminals now abusing the legitimate Googlebot server using fake User-Agent from another Google service to deliver Crypto-currency malware to the target victims...
A new more sophisticated phishing campaign uses hijacked email accounts to deliver malware as a part of the response to the existing...
Cyber criminals now using IQY Files as a new technique for spreading dangerous FlawedAmmyy malware which is a dangerous backdoor tool that...