Law enforcement agencies announced the results of Operation SaboTor, a coordinated international operation targeting vendors and buyers of dark web market places....
A typical antivirus products and End Point services today generally speaking comes with two ways of detecting malware: Signature-based Heuristics The signature-based...
According to MalwareBytes’s 2019 State of Malware Report, Trojans and crypto miners are the dominate malware threats of 2019. Android phones may...
Beware! If you are using UC Browser on your smartphones, you should consider uninstalling it immediately. Why? Because the China-made UC Browser...
Lockergoga infection was first spotted in January 2019, the ransomware particularly targets on critical infrastructure. The Lockergoga ransomware encrypts all the files...
Cyber Criminals abused the worlds largest computer maker ASUS computers software update tool by hijacking the company server and install the malware....
According to the authors of the book ‘Learn ethical hacking’, a group of hackers has infected hundreds of thousands of Asus computers...
Remember the CCleaner hack? CCleaner hack was one of the largest supply chain attacks that infected more than 2.3 million users with...
Sophisticated AZORult Malware emerges in a new form with advanced information stealing modules that capable of stealing sensitive information from infected computers....
The Pirate Bay is one of the leading copyright-protected content download platforms. According to an expert from the best ethical hacking Institute...
Subscribers to the PewDiePie YouTube channel have decided to take drastic steps to make the famous content creator consolidate as the user...
ESET researchers detail the latest tricks and techniques OceanLotus uses to deliver its backdoor while staying under the radar
Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250[6]) to hide the njRAT backdoor and targeting users reside in the...
According to a blog post from threat research department Unit 42 of cyber security company Palo Alto Networks published on March 19,...
Reports of an ethical hacker from the International Institute of Cyber Security mention that Norsk Hydro, one of the world’s leading aluminum-producing...
Mirai malware is a powerful strain that compromises a number of Linux devices and uses those devices to launch a massive distributed...
attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based on Proofpoint...
Hackers exploiting zero-day vulnerabilities in Counter-Strike 1.6 game client to infect player’s devices by using a malicious gaming server and downloads malware...
Cyber criminals now approaching a unique way to spread Powload malware with the help of steganography to infect the targeted system. Powload...
Recent In-depth analysis against Android Antivirus in Google play store reveals that, 138 Android antivirus products are completely fake and potentially harmful...
For decades, people are using email attachments in order to send files to their intended recipients. However, using emails as a channel...