We have all heard or seen malware that is embedded within malicious links. Usually, the user is prompted to click the link...
Short Bytes: A few weeks ago, we got to know about a vulnerability that dealt with all versions of Samba. While a patch...
Trojan Dvmap distributed through the Google Play Store, uses various exceptionally dangerous methods, including patching system libraries. It installs malicious modules with...
The IT security researchers have discovered a malware in China that has mimicked WannaCry ransomware attack to some extent and has been...
A unique and perhaps a very practical way of injecting malware into an entire network has been discovered in which the hacking...
Google Play Store has been found harboring another malware and this one has the ability to disable the security settings on Android...
Short Bytes: After wrecking havoc on unpatched Windows computers using WannaCry, some new notorious hackers from China are targeting Android smartphones. They’ve...
Short Bytes: In the recent past, ransomware has emerged as one of the most challenging cyber security threats. This has demanded the...
Yesterday, a group of IT security researchers had revealed that Russian hackers are controlling malware operation through the official Instagram account of...
Short Bytes: Researchers have linked a Russian hacker group called Turla to a malicious Firefox extension which contacts its C&C server using the...
A group of Russian-speaking hackers has been attacking multiple governments for years now. Not only that, but they also experimented with different...
Short Bytes: Fireball is a new and notorious malware in town which is targeting Windows and macOS devices. Developed by a Chinese...
As a small business owner, you’re bound to take great pride in what you do and use every opportunity you can to...
A recently leaked NSA exploit that was discovered in the biggest ransomware attack (WannaCry) ever is now powering Trojan malware. The EternalBlue...
The dark web marketplaces and undergrown marketplaces are full of vendors selling databases, weapons, illegal drugs and malicious software. Now security researchers have...
Since the spread of WannaCry ransomware attack the cyber security community is doing whatever it takes to identify new threats against unsuspecting users....
Chinese threat operation which has infected more than 250 million PCs around the world. The advanced malware, Fireball, takes control target browsers...
In its latest release as part of the Vault 7 series, WikiLeaks has apparently leaked a document which consists information regarding a...
One of the CIA Cyberweapon Called “Pandemic” Document Leaked by Vault 7 Projects of WikiLeaks.This Malware tool Specifically interact and run as...
For almost four months, script kiddies ran amok in one of Stanford’s subdomains, installing web shells, mailers, and other types of web...
Google published a blog post introducing machine learning to detect phishing Emails, click-time warnings for malicious links, and unintended external reply warnings....