Security researchers have discovered a rare piece of spyware for Linux named evilgnome, which is currently not found in all major antivirus...
Security researchers have discovered a rare piece of Linux spyware that’s currently fully undetected across all major antivirus security software products, and...
On June 6, 2019, Google released a case study of very intelligent hackers who were trying to plant backdoor in Android phones....
IT systems audit experts report an alleged hacking attack against the GitHub account of Canonical Ltd, the company in charge of Ubuntu,...
ESET researchers have discovered a malicious campaign distributing a backdoor via torrents, with Korean TV content used as a lure
Researchers discovered a new malware campaign called ViceLeaker that specifically targeting the Android users with sophisticated backdoor capabilities to Hijack camera, delete...
Rootkit Hunter is a scanner tool for Linux that scans for backdoors, rootkits and local exploits on your systems. Installs all dependencies...
Triada Banking Trojan came Preinstalled as Backdoor in Budget Android Smartphones- Google Confirms. It would probably be the first time ever in...
According IT security audit service specialists, Google recently recognized that a group of cybercriminals discovered a backdoor preinstalled on Android devices during...
Almost all mobile phones make two serious mistakes for their users: following their movements and listening to their conversations. That’s why we...
Cybercriminals from Sednit group, also known as Fancy Bear, APT28, Sofacy launching new Zebrocy Malware that indented to open backdoor on the...
Researchers discovered a “Blackwater” malware campaign that suspected to associated with well known MuddyWater APT bypass the security control and install a...
Threat actors have compromised the Asus technology manufacturer update mechanism to install malware that allows installing a backdoor on compromised computers. According...
Researchers have discovered a severe vulnerability in Cisco products that could allow attackers to implant persistent backdoor on wide range devices used...
Reports of IICS web application penetration testing experts mentioned that a group of Russian cyber spies created one of the most advanced...
Criminal activities against accountants on the rise – Buhtrap and RTM still active
Well-Known and advanced threat actors groups TA505 APT distributing a new variant of ServHelper malware that distributed via weaponized Excel 4.0 macro...
The authors of the book ‘Learn ethical hacking’, along with specialists from the International Institute of Cyber Security (IICS), report the existence...
Consumer technology vendors often advise their customers to only install updates and patches only via the official channels to make sure that...
According to ethical hacking researcher, backdoor is an malware which is used to break authentication of any computer system. Now day’s most...
According to the authors of the book ‘Learn ethical hacking’, a group of hackers has infected hundreds of thousands of Asus computers...