Various anti-malware vendors are scrambling to fix their products in order to detect the new variant of Separ malware family. Separ is...
New Threat report revealed that Credential stealing malware were dramatically increased in 2018 that target the adult websites premium users credentials to...
Malicious campaign operators have devised a new method for sending documents with malicious files Phishing campaign operators found ways to prevent malware-loaded...
Cyber Criminals now distributing new dubbed Muncy malware as a EXE file format via DHL phishing campaigns to target the users around...
ATM hijacking malware dubbed WinPot turns the ATMs into a slot machine, which starts dispensing the cash based on SPIN button. Security...
The latest version of the tool is functional for those who suffered ransomware infections between November 2018 and February 2019 Network security...
Many of the torrent sites strictly banned the popular torrent uploader CrackNow that caught for upload malicious files including GandCrab Ransomware. A...
A new unique campaign abuses system native OS process and security software to steal passwords and personal information. Threat actors disguise the...
Around 120 service providers are exposed to attacks due to a non-updated vulnerable plugin A group of hackers exploited a vulnerability revealed...
An interview with ESET malware researcher Lukáš Štefanko about Android banking malware, the topic of his latest white paper
The new variant of infamous trickbot malware comes with the capability of grabbing remote application login credentials. Trickbot is a banking malware...
Seems like 2019 is starting to become the year of the Trickbot malware, which received good coverage here in Hackercombat.com for being...
A group of experts published their research on this attack Network security and ethical hacking specialists from the International Institute of Cyber...
Security Researcher discovered a vulnerability in macOS Mojave let malware apps bypass the privacy protection and read the safari browser web history....
The clipper hijacking malware use to intercept the contents of the clipboard and replaces it with the content the attackers want to...
Malicious actors can replace cryptocurrency addresses thanks to this clipboard malware Network security and ethical hacking specialists from the International Institute of...
Company customers ignore whether this flaw brings more serious consequences According to network security and ethical hacking experts from the International Institute...
A new highly obfuscated malware dubbed Qealler designed to steal sensitive information from the infected machine. The malware is written in java....
Threat actors tainted the popular Android app within Google play with more than 50 million installs to deliver the Triout Android malware....
APT32 malware has been covered here in Hackercombat recently, and we are set to update you of the latest findings from Palo...
Cyber Criminals now distributing powerful ursnif malware via malicious Office Documents with multi-stage highly obfuscated PowerShell scripts to bypass security controls. ursnif...