Attackers using the SambaCry vulnerability to target older versions of Samba(3.5.0) to upload and execute the malicious payload. SambaCry Vulnerability(CVE-2017-7494) have the...
New Android malware variant GhostCtrl steals data, control devices functionalities and even hijack the devices. It is certainly a variant of commercially...
Over the weekend, Emsisoft security researcher xXToffeeXx discovered a new ransomware called Reyptson that is targeting Spanish victims. Since then, we have seen increased activity in...
A new Android RAT (Remote Access Trojan) detected under the name of GhostCtrl can lock mobile device by resetting their PIN and...
A New MacOS Malware “OSX/Dok” Discovered to Steal Banking Credentials by cloning major Banking website which leads victims to install the Malicious...
Yesterday, Malwarebytes malware researcher Marcelo Rivero discovered a new variant of the CryptoMix ransomware that is appending the .EXTE extension to encrypted file names. This article...
The origin of Petya The first Petya ransomware was released around March 2016 by a person/group calling themselves Janus Cybercrime Solutions. This...
Eternal Blues, a tool used in finding computers and Endpoints vulnerable to the NSA’s ETERNALBLUE exploit. All we need to do is...
A newly discovered Point of Sale (PoS) malware dubbed LockPoS appeared in the wild and it is being delivered through the Flokibot botnet....
WikiLeaks Revealed a CIA Secret Document of Android Mobile Hacking Tool called “HighRise” steal the victims Android smartphones data and send to...
Vuln hit “all versions of Samba from 4.0.0 onward using embedded Heimdal Kerberos.” On Wednesday, the Samba Team released new security updates to fix a vulnerability in...
A new click-fraud trojan is infecting Windows computers and using virtual desktops to click on ads in search results to earn a...
Security experts at TrendMicro discovered that the notorious Adwind RAT has resurfaced targeting enterprises in the Aerospace industries worldwide. Crooks are even more opportunists,...
The progression in Artificial Intelligence have incited intense debate worldwide, some experts are calling AI to counter malware attacks In a short...
You can get the sample from theZoo SHA-256: 1b893ca3b782679b1e5d1afecb75be7bcc145b5da21a30f6c18dbddc9c6de4e7 We can use behavior analysis from hybrid-analysis. Seems like there is no known protection mechanism. In...
A Newly Discovered Android Malware “SpyDealer” Spying on more than 40 Apps and steals Personal information including contacts list, Call History, capture...
The master key to the original version of the Petya ransomware – not to be confused with the latest and massive Petya/ExPetr...
a new variant of mobile ransomware SLocker (detected by Trend Micro as ANDROIDOS_SLOCKER.OPST) was detected, copying the GUI of the now-infamous WannaCry....
Security experts have discovered a brand new Android trojan that features a broad range of features that allow it to root Android...
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the...
WikiLeaks Revealed Another CIA Cyber Weapons called “BothanSpy” and “Gyrfalcon” steals the SSH Credentials from both Windows and Linux Platform and both...