A researcher has detected a critical vulnerability in some of the most common malware and ransomware variants today and whose exploitation would...
A new malware capable of controlling social media accounts is being distributed through Microsoft’s official app store in the form of trojanized...
At least 17 malware-laced packages have been discovered on the NPM package Registry, adding to a recent barrage of malicious software hosted...
Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. With Thread Hijacking, it allows the hijacker.exe program...
Watch out Windows users! There’s a new strain of malware making rounds on the Internet that has already infected thousands of computers...
The vulnerability in the Zoom video conference app lets attackers hijack Mac’s camera by merely using malicious websites. The Zoom video conference...
Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. What is DLL hijacking ? Windows...
The stolen OGUsers database is available on RaidForums for download. On 12th May, hackers managed to steal the database of a famous...
Hackers sent to jail for stealing over $2M USD in cryptocurrency with SIM hijacking attack. According to IICS’s web application security course,...
Researchers discovered a new malicious campaign called “Sea Turtle,” attack public and private entities in various countries using DNS hijacking as a...
A Tools Session Hijacking And Stealer Local passcode Telegram Windows Features : Session Hijacking Stealer Local Passcode Keylogger Shell Bypass 2 Step...
A DNS hijacking campaign, active for at least three months, has been attacking users of the most popular online services, such as...
A protocol implementation error appears to be the cause of this flaw Network security and ethical hacking specialists recently published a report...
The clipper hijacking malware use to intercept the contents of the clipboard and replaces it with the content the attackers want to...
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin...
A flaw in how WordPress handles privileges can be exploited to take control of a domain A flaw in the WordPress process to...
A security researcher named Sebastián Castro has uncovered a way of gaining admin rights and boot persistence on Windows PCs that is...
It has been revealed a dangerous flaw in macOS that allows hackers to hijack applications installed through unusual routes A security report...
Domain Hijacking is a well-known security issue that can be carried in many different ways. In addition to social engineering or unauthorized...
Roaming Mantis Malware expands Geographically with many new capabilities. Initially, it targets only the Android users, now the malware authors improved their...
In March 2018, Japanese media reported the hijacking of DNS settings on routers located in Japan, redirecting users to malicious IP addresses....