The cybersecurity researchers at Lumen’s Black Lotus Labs asserted that in order to mine crypto-currencies and launch DDoS attacks, hackers are deploying...
Taiwan’s Presidential website and several websites run by the government of Taiwan were disrupted by distributed denial-of-service (DDoS) attacks hours before United...
A new Android malware called ‘Autolycos’ installed over 3 million times is surfing on the Google Play Store by secretly subscribing users...
SHI International Corp., formerly called Software House International, is a privately-owned provider of technology products and services, headquartered in Somerset, New Jersey....
Two months have passed since the Black Basta Ransomware first surfaced. Nearly 50 victims have already been reported from the following countries:-...
QNAP released a security advisory detailing the critical PHP vulnerabilities that allow an attacker to Remote Code on QNAP NAS Devices. According...
The Chinese hacking group known as Tropic Trooper was attributed to a new campaign discovered by cybersecurity researchers at CheckPoint. In this...
An active exploit in the wild for a vulnerability in the Apple Safari web browser has been publicly revealed by the Google...
Technology is evolving at a rapid pace and along with it, the threat actor behind the BRATA banking trojan has also improved...
An APT group named GALLIUM has recently been using a new and hard-to-detect remote access trojan named PingPull. The trojan is being...
The recently emerged ‘FakeCrack’ campaign has been disclosed by the researchers of Avast. The malware campaign tempts users into downloading fake cracked...
There has been a warning from security experts about malware first identified as SMSFactory, an Android-based threat. Through the malware, the victims...
There has been an increasing amount of interest in targeting the Windows Subsystem for Linux (WSL), due to the fact that they...
Currently, a new botnet extends its reach with the help of code originating from various pieces of malware. The company is doing...
It has been observed by researchers from Microsoft that credit card skimmers are on the rise, in which threat actors are employing...
In an analysis published recently by specialists at Check Point Research, a new spy campaign was discovered, dubbed “Twisted Panda”. This spy...
The contestants who successfully exploited 16 zero-day bugs within 16 different products in the Pwn2Own Vancouver 2022 first day won more than...
Several hackers have newly begun exploiting a recently patched critical vulnerability, identified as CVE-2022-30525, which is affecting business firewall and VPN devices...
The database containing 10GB worth of user information of three VPN services such as ChatVPN, SuperVPN, and GeckoVPN was leaked in the...
NAS device maker QNAP released software updates for its network-attached storage (NAS) products on Friday. While this updated software package is focused...
Experts from Trellix discovered that VHD Ransomware was linked to North Korea’s cyber army. The cyber-army of North Korea has been divided...