Researchers uncovered a new ransomware family named “Buran” ransomware that works as a Ransomware-as-a-Service(RaaS) model and actively selling in a well-known Russian...
Back in May 2019, Microsoft revealed details about a severe hackable flaw that exists in the Remote Desktop Protocol (RDP) in Windows...
Researchers discovered a new malicious campaign that delivered Different payloads such as Agent Tesla spyware and Ave Maria RAT To steal username...
One of the most frequently used messenger services out there is Discord among others. Lately, they have been in trouble due to...
Winnti hacker group uses a new malware dubbed skip-2.0 to attack Microsoft SQL Servers and to gain persistence access. Winnti group believed...
Researchers discovered a new malware campaign from the Winnti threat group that utilizes the supply-chain attacks with a new set of artifacts to...
Windows licenses are usually expensive. For example, for an original license of Microsoft’s “Windows 10 Pro” in the official Microsoft store 199.99$...
Researchers found a new footprint about the recent BitPaymer ransomware campaign that was exploited the Apple iTunes for Windows Zero-day vulnerability to...
A couple of months ago, a team of digtial forensics specialists from security firm Morphisec discovered a malicious campaign that used a...
Microsoft issued a serious warning about the new form of stealthy fileless Malware campaign “Nodersok” that attacks windows computers using living-off-the-land techniques....
Microsoft has confirmed that a Node.js-based malware dubbed Nodersok has affected thousands of Windows PCs over several weeks. This new strain of...
Cryptocurrencies have been known to be the cause of fortune for quite a few people. It all started from 2009 and even...
According to Microsoft, unprotected servers can spread viruses and malware over the network without the user’s interaction. Microsoft is warning users to...
Vulnerability testing specialists have revealed a security vulnerability that affects all Windows operating system computers running on Intel and AMD 64-bit processors....
If you have recently purchased Microsoft Office from a genuine Microsoft reseller, the process of installation is as easy and simple as...
According to Matt Miller, a security engineer with the Microsoft Security Response Center, many zero-day vulnerabilities are ineffective against the newest versions...
There are a ton of software to share files between phone and PC; however, I have never encountered file-sharing software that is...
Specialists in ethical hacking from the cybersecurity firm Kaspersky reported the discovery of a new ransomware variant much more dangerous than encryption...
All of a sudden, a couple of days ago, Microsoft reached out to its Twitter handle and started teasing the good old...
If you’re a Windows user, chances are quite less you haven’t opened Windows Registry after tweaking some values just the way a...
Windows 10 bug: If you have a device connected via cable to the USB Type-C input, you may have to wait another...