A new trojan dubbed SpeakUp exploiting six different Linux distributions with know vulnerabilities. The campaign primarily targeting East Asia and Latin America,...
OceanLotus group known for Multiple attack campaigns around the globe, the threat actor group targets private sectors across multiple industries, foreign governments,...
A new dangerous Mac Malware discovered that stealing the cookies when users visiting a website that belongs to cryptocurrency exchanges and wallet...
Cybercriminals are using new sophisticated techniques to spread CSV malware via Google sheets instead of using Microsoft Excel sheet which is often...
Iranian cyber espionage group APT39 focus on stealing on personal information o perform monitoring, tracking, or surveillance operations against specific individuals. The...
Formbook campaign with what looks like a few changes. Recently the criminals distributing this malware have been using .exe files inside various...
Threat actors misuse the popularity of the TeamViewer Tool and utilizing it to drop the malware on victim devices that steal sensitive...
Cyber Criminals now using new Stenography technique to distribute a powerful Obfuscated PDF exploit in order to compromise the targets and evade...
A new Ransomware called Anatova has been discovered in a private peer to peer network which is believed to be a very...
Welcome to the Massive Data breach of 2019, around 773 million datas contains email addresses and passwords were breached and circulated in...
Ryuk first appeared in August 2018, and while not incredibly active across the globe, at least three organizations were hit with Ryuk...
A chrome extension that still available on Chrome Web Store steals the payment card information from website forms visited by the users....
Researchers discovered a major security vulnerability in online flight ticket booking system that affected almost half of the fight travelers around the...
The City of Del Rio IT system was compromised by the Ransomware attack that leads to shut down the regular operation and...
USB-IF announced USB Type-C Authentication Program to confirm the authencity of the USB device USB device, USB cable or USB charger. The...
A new landscape study states that an upcoming mobile devices may comes with per-installed mobile malware along with malicious code in it....
More than 2.4 million Blur password manager users data has been exposed online, the Blur password management service owned by Abine. According...
The tendency for companies to adopt consumer technologies (also known as commoditization) is increasing rapidly and that means a change in the...
A disk wiping Shamoon malware performing destructive attack sample using an image of a burning US Dollar. This malware was uploaded in...
A new campaign that delivers malicious PDF file that leads to download the file malicious APK file to the user’s device. Quick...
Researchers recently observed that cyber criminals using a weaponized memes in order to communicate with malware for various malicious operations. Memes are...