When DNA was synthesized, nobody had thought that it could be used to spread computer viruses, but a group of researchers from...
An unknown hacking group has been targeting organizations in North Korea with Konni Malware. It is a RAT/remote access Trojan having all...
A new research published last week by Willem Westerhof describing an outsized scale cyber attack targeting the crucial electrical infrastructure based on...
As you might know, 23-year-old Marcus Hutchins (@MalwareTechBlog on Twitter) who once made the news for stopping WannaCry ransomware attack was arrested by the...
A Russian man accused of infecting tens of thousands of servers through Linux malware around the world to generate millions of dollars...
An IT security researcher going by the Twitter handle of @MalwareTechBlog (real name Marcus Hutchins) has been detained by the law enforcement authorities...
The Vault7 saga is far from over, and every passing week we are being introduced to a new set of tricks and...
Even though WannaCry and Petya ransomware wave have slowed down, motivated by money laundering criminals, and hackers have taken world class outbreaks...
Security researchers have discovered that one of Android’s most dangerous Mobile banking Trojan family has been modified to add a keylogger for...
Short Bytes: A team of Italian security researchers has created a Windows filesystem add-on named ShieldFS to fight the ransomware attacks. By...
In the recent DEF CON Meet, technical director of security shop Endgame Hyrum Anderson disclosed a research paper on adapting API frameworks...
Android devices are one of the most vulnerable mobile OS (operating systems) due to its open source nature. But what would a...
This without a doubt is the second largest health data breach caused by a ransomware attack. An Oaks, Philadelphia based women’s healthcare...
It’s no surprise that the Internet of Things (IoT) devices are highly vulnerable to cyber attacks but who would know a time...
A JA3 hash represents the fingerprint of an SSL/TLS client application as detected via a network sensor or device, such as Bro...
Law enforcement authorities in China have arrested eleven hackers suspected of developing Fireball malware which infected 250 million computers worldwide. Among the...
With every passing day, hackers and cyber criminals are becoming more sophisticated in their attacks. Resultantly, they are getting their hands on...
Kaspersky Lab has identified the presence of a backdoor designed primarily for attacking Windows systems. When the backdoor successfully infects the system...
ATMs (automated teller machines) have remained a preferred target of hackers around the world. Last year, ATMs in over a dozen locations...
Short Bytes: Two malware which go by the name FruitFly and FruitFly 2 have been discovered over the course of the last...
Surveillance malware dubbed Firefly was easy to spot but flew under the radar anyway. A mysterious piece of malware that gives attackers...