Perhaps it is not so surprising to see powerful malware now being created to target Android devices. Researchers at Trend Micro recently...
Researchers at Proofpoint recently discovered a mass-marketed malware called Ovidiy stealer whose main purpose is to steal passwords from victims. It is...
Gandi SAS, a French web hosting company has announced that it suffered a security breach after hackers got hold of the valid login details...
IT security researchers at Checkpoint recently discovered that a new malware has started to rise and is targeting Mac devices. The malware...
Short Bytes: The latest WikiLeaks Vault 7 leak deals with an Android malware that doesn’t need the internet to talk to the CIA...
A newly discovered Point of Sale (PoS) malware dubbed LockPoS appeared in the wild and it is being delivered through the Flokibot botnet....
WikiLeaks is back with yet another batch of Vault 7 related documents detailing the CIA’s (Central Intelligence Agency) hacking tools and programs targeting...
Remote Access Trojan(RAT) Called “Adwind”(Adwind/jRAT) Targeting Aerospace Industries to steal credentials, record and harvest keystrokes, take pictures or screenshots, film and retrieve...
The self-service kiosks of Avanti Markets were recently hacked with criminals stealing customer information which included credit card numbers, the first and...
Short Bytes: The security researchers have identified a malware named SpyDealer, which affects Android smartphones running Android versions between 4.4 KitKat and 2.2...
Nowadays attackers targeting users more innovatively through Emails and many other ways. This malware attack particularly targeting power sectors including Nuclear power...
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the...
WikiLeaks dumped today the documentation of two CIA hacking tools codenamed BothanSpy and Gyrfalcon, both designed to steal SSH credentials from Windows...
Ruslan Bondars and Jurijs Martisevs were identified as the main culprits behind a crime in which they were selling malware over the...
Short Bytes: In the wake of recent Petya/NotPetya attack, to prevent the further cyber attacks, Ukraine’s Cyber Police has seized the servers of...
Last week the computer systems of several companies in Europe were infected with NotPetya malware. At first, the researcher thought it’s just...
Short Bytes: Petya wiper is a dangerous malware that has disguised itself as a ransomware to get the attention of media. After...
As you may know, WikiLeakes has been releasing sensitive documentation associated with CIA’s hacking tools as part of its Vault 7 series....
Microsoft’s Windows operating system seems to have been having a really bad year given the major cyber attacks taking place including the...
Short Bytes: Petya malware, which is being seen as WannaCry’s obvious successor, isn’t a ransomware. It actually disguises itself as one to...
The breakout of the Petya malware two days ago has caused mayhem once again. It has been the second major global cyber...