A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate Member that has more than 200,000 active installations....
A novel malware campaign has been observed targeting Redis servers for initial access with the ultimate goal of mining cryptocurrency on compromised...
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned that more than 2,000 computers in the country have been infected by...
The threat actors associated with the 8220 Gang have been observed exploiting a high-severity flaw in Oracle WebLogic Server to propagate their...
The recently disclosed critical security flaw impacting Apache ActiveMQ is being actively exploited by threat actors to distribute a new Go-based botnet...
A new cryptojacking campaign has been uncovered targeting vulnerable Docker and Kubernetes infrastructures as part of opportunistic attacks designed to illicitly mine...
Microsoft is warning of a new variant of the srv botnet that’s exploiting multiple security flaws in web applications and databases to...
Digital forensics specialists report a new attack method consisting of the use of WAV audio files to hide and deliver backdoors and...
The cryptocurrencies fever has led many interested parties to commit crazy acts in order to make a profit easily and without spending...
An estimated 2 million cyberattacks took place in 2018 costing more than $45 billion in damages worldwide. The worse part is that...
If you download pirated content from torrent platforms, you can be a victim of this Mac malware. There is a new variant...
A group of web application security experts from Trend Micro firm have detected a hacking campaign against Oracle WebLogic Server implementations to...
After a long time, the cryptocurrency mining script known as Coinhive has finally ceased to be a problem for system administrators and...
Website security audits specialists have detected a long-range cryptojacking campaign; it is reported that the threat actors behind this campaign, allegedly Chinese...
What is Cryptojacking? It is an attack in which hackers secretly utilize the computing power of your device to mine cryptocurrency – The cybercrime...
Ransomware played havoc in 2017, and later in 2019, we all thought that hackers have moved on to crypto jacking, which is...
Due to hard detection and easy execution of the attack, 2018 has seen excessive crypto mining malware. Cryptojacking attacks are based on...
According to a new report, around 415,000 routers throughout the world are infected with malware having the potential to steal computer resources...
Virus infection, ransomware, phishing or cryptojacking malware are not the only techniques that cybercriminals used to earn money from their victims, a...
The growth of Bitcoin and its derivative cryptocurrencies have expanded people’s point-of-view on what it really is, a new representation of real-world...
The trojan also installs a rootkit and another malware variant that can lead to denial-of-service conditions Perhaps the malware variants that affect...