Researchers discovered a new malware campaign called ViceLeaker that specifically targeting the Android users with sophisticated backdoor capabilities to Hijack camera, delete...
We rarely feature a story about MacOS security here in Hackercombat.com, as the platform is not really attractive for hackers to target....
IT security audit specialists from the cybersecurity firm Intego have reported supposed in the wild exploitation of an uncorrected vulnerability in some...
Infamous Chinese APT 10 hackers compromised over 10 Telecom networks around the world under the campaign called Operation Soft Cell and stealing various...
Cybersecurity researchers from Intego are warning about possible active exploitation of an unpatched security vulnerability in Apple’s macOS Gatekeeper security feature details...
Microsoft uncovered a new campaign with a sophisticated infection chain delivering notorious FlawedAmmyy RAT as a final payload. The attack starts with...
What is Botnets? Botnets are artificial networks created by malware, which can be controlled by the virus author remotely. Here in Hackercombat.com,...
Researchers discovered a fake photo editing apps which are used by cybercriminals to launch MobOk Malware that takes complete control of the...
Cybersecurity researchers from at least two firms today unveiled details of a new strain of malware that targets Windows and macOS systems...
Okay, folks, it’s time to update your Firefox web browser once again—yes, for the second time this week. After patching a critical...
Waterbug APT Hackers used hijacked infrastructure to attack governments and international organizations through various campaigns using new and publically available malware. The...
The story of a Linux miner bundled with pirated copies of VST (Virtual Studio Technology) software for Windows and macOS
A few months ago, specialists in digital forensics analysis of security firm Kaspersky analyzed Plurox, a backdoor detected in some attacks that...
A new malware dubbed Plurox spread itself over the local network using EternalBlue exploit and let attackers gain access to the network...
A group of web application security testing experts has released a new version of the tool to remove the encryption imposed by...
Cybersecurity researchers have released an updated version of GandCrab ransomware decryption tool that could allow millions of affected users to unlock their...
Researchers discovered new malicious Android apps from Google Play Store bypassing SMS-based two-factor authentication (2FA) mechanisms and steal the OTP without SMS’s...
Any person who has ever used a computer has probably heard the term “malware.” It is everywhere, and the general consensus is...
A couple of years ago the Mirai botnet put thousands of system administrators in trouble before being dismantled; however, website security audit...
ESET analysis uncovers a novel technique bypassing SMS-based two-factor authentication while circumventing Google’s recent SMS permissions restrictions
New malware spotted on Google play that directs users to malicious websites and subscribes users to advertising notifications. The malware is distributed...