The Federal Bureau of Investigation (FBI) issued a report warning that a group of hackers sponsored by national states is operating a...
The Microsoft Security Response Center yesterday released several security updates for Microsoft Exchange Server. These updates were targeted at addressing vulnerabilities that...
Newly discovered Android vulnerability dubbed “StrandHogg” being exploited in wide by unknown hackers using weaponized malware apps that posed as a legitimate...
A new wave of Roboto Botnet activities being discovered that attack the Linux Webmin servers by exploiting the RCE vulnerability using vulnerability...
Researchers detect a wave of malware campaigns from a new hacking group named TA2101 that targeting various organizations in German and Italy...
UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known bypasses....
Cybersecurity researchers have spotted a new cyberattack that is believed to be the very first but an amateur attempt to weaponize the...
Researchers discovered an ongoing buggy malware campaign that attempts to exploit the newly discovered vulnerabilities resides in the WordPress theme and plugin....
Ethical hacking experts report that, in recent days, threat actors have been scanning the Internet looking for non updated SSL VPNs developed...
Thefatrat a massive exploiting tool bypass most AV software An Easy tool to Generate Backdoor for bypass AV and Easy Tool...
Researchers discovered a new Android malware called “Agent Smith” that infects nearly 25 million mobile users around the globe without letting users...
USCYBERCOM published an alert that hackers were exploiting the CVE-2017-11774 Microsoft Outlook Security Vulnerability to deliver malware using an HTTPS domain. Microsoft...
BoomER is an open source framework, developed in Python. The tool is focused on post-exploitation, with a main objective, the detection and...
A web application security testing revealed that threat actors are actively exploiting a remote code execution vulnerability in some versions of SharePoint...
Taking advantage of newly disclosed and even patched vulnerabilities has become common among cybercriminals, which makes it one of the primary attack...
Hackers exploiting the recently disclosed Oracle WebLogic Server remote code execution vulnerability to install a new variant of ransomware called “Sodinokibi.” The...
The Banking and Financial sectors were hit with a constant stream of cyber attacks when compared to any of the other industries....
Here comes news about another WordPress website security breach carried out by exploiting plugin vulnerabilities. Reports say that hackers have been exploiting...
In this attack, eGobbler threat group is exploiting Chrome Sandboxing bug to target iOS devices in the US and EU. Malvertising campaigns,...
These malicious files allow victims’ data collection Network security and ethical hacking specialists from the International Institute of Cyber Security report the...
Cybercriminals have actively started exploiting an already patched security vulnerability in the wild to install cryptocurrency miners on vulnerable Drupal websites that...