Today, criminal organizations no longer attack corporations and businesses physically with weapons. Instead, they use computers and malware, aiming to steal vital...
Here in hackercombat.com, we have covered stories about bank trojans on a fairly regular basis. Blackhat hackers are after people’s money, profit...
A malicious code has infected Event-stream JavaScript library with the intention of stealing cryptocurrency from digital wallets. The popular JavaScript library is...
Hackers could abuse a feature that allows you to attach a video directly to a Word document for the victim to download...
The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity. One of them is the practice of...
Windows Digital Signature check is a mechanism included in Microsoft Windows to make sure that the software or driver you’re trying to...
Publicly known “magic string” lets any site run malicious code, no questions asked. The Chrome browser extension for Cisco Systems WebEx communications...
Researchers at Fox-IT warn that the website of security certification provider EC Council has been compromised to host the malicious Angler Exploit...