The dark web is mainly known for the idea that in this sector of the Internet you can find all kinds of...
SonicWall has addressed three critical security vulnerabilities in its hosted and on-premises email security (ES) product that are being actively exploited in...
A malicious code exploited a newly fixed zero-day flaw in the Google Play store that affects multiple Android devices, including Pixel phones...
US President Donald Trump always resorts to the term ‘fake news’ to refer to news reports that are not favorable to him,...
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities. My focus is on...
A new highly sophisticated malware campaign targets Tibetan groups to exploit and install spyware on their iPhone and Android devices. The spyware...
A Senior staff oficial group was contacted on Whatsapp from a unknown number. The caller claim to be Jason Mu, Head of...
Zero-Day Android exploits are now more valuable then iOS exploits. The infosec and premium zero-day acquisition platform Zerodium known for selling zero-day...
Researchers discovered a new Sodin Ransomware (also known as Sodinokibi) that exploits the Windows Elevation privilege vulnerability resides in the Win32k component....
Cybersecurity researchers from Intego are warning about possible active exploitation of an unpatched security vulnerability in Apple’s macOS Gatekeeper security feature details...
Threat actors from MuddyWater APT groups now add a new set of latest exploits to their hacking arsenal and tactics, techniques and...
A new malware dubbed BlackSquid bags eight notorious exploits to drop XMRig Monero cryptocurrency miner targeting web servers, network drives, and removable...
Researchers discovered a new wave of Mirai Variant that used 13 different exploits to attack various router models and other network devices....
A couple of weeks back, a zero-day vulnerability was discovered in Oracle WebLogic Servers that can trigger the deserialization of malicious code and allow...
FireEye released a Free automated analysis tool FLASHMINGO, which enables malware analysts to detect suspicious flash samples and to investigate them. The...
Security researchers have uncovered a new variant of the infamous Mirai Internet of Things botnet, this time targeting embedded devices intended for...
A brand new JNEC.a ransomware spreading via recently discovered WinRAR vulnerability exploit to compromise windows computer & demand the ransom amount. This...
Researchers have detected the first malspam campaign that delivers a malicious RAR archive to infect victim’s computer exploiting the WinRAR ACE vulnerability....
Cybersecurity researchers have warned the public that there is a convincing phishing email pretending to be coming from Telstra, the Telco giant....
One of the dangerous Fallout exploit kit now back to form with various new futures and delivering one of the widely distributed...
Well, there’s some good news for hackers and vulnerability hunters, though terrible news for tech manufacturers! Exploit vendor Zerodium is now willing...