Insurance companies Lexington Insurance and Beazley Insurance are suing an information security firm to recover the insurance rates paid to Heartland...
It turns out that most of the naturally distributed LokiBot malware samples are modified versions of the original sample, a security researcher...
Arch Linux software repository named Arch User Repository (AUR) has been infected by malware. As many as three Arch Linux packages available...
There’s no doubt that Linux and Mac are more secure operating system choices as opposed to Microsoft Windows. But this doesn’t mean...
A code signing certificate allows an application developer to sign their software before publishing to the web and the end-users can verify...
The Rakhni Trojan is now giving bad actors the ability to infect victims either with a ransomware cryptor or a miner. An...
A new malware campaign that delivers Emotet Malware Via Microsoft Office documents attachments with “Greeting Card” as the document name. Attackers targeted...
A flash drive or USB may provide a capacity as large as 2TB or could have a small space of 256 MB...
Rakhni Trojan which was first discovered in 2013 has evolved over the course of five years. As an addition to its already...
Because the transfer of data used to function through the Sneakernet, personal computing in the 80’s and 90’s was a lot more simple. The slang...
Pentest specialists discovered a malware piece that infects systems with ransomware cryptocurrency mining programs, depending on equipment specifications and configuration, to decide which...
Remember last year, Verizon released data breach investigation report that showed 80 percent of the hacking was related to stolen password. The cybercriminals used...
After being offline for over a week, The Pirate Bay is back online with a cryptocurrency mining code. Last year, it was...
Cybercriminals using a malicious macro that changes the target of Desktop Shortcuts to download malware and when the user clicks on the...
A researcher discovered new double Zero-day exploit that affected Adobe Acrobat, Reader and older Windows 7 platforms, Windows Server 2008. This critical Zero-Day...
Hackers targeting Cryptocurrency users On Slack and Discord chat platforms with MACOS Malware dubbed OSX.Dummy. The malware targeted users in crypto related...
Phishing attacks have become a common occurrence in the digital age. While most of us already know what these email scams look...
A new malware was discovered on sale for the amount of 50 dollars in its beta version, but promising the possibility of...
A new Cyber Espionage Group dubbed RANCOR identified targeting South East Asia using new malware families PLAINTEE and DDKONG. The RANCOR group...
Necurs botnet malware emerging again with new set of futures to create a backdoor on victims machine to steal sensitive data and...
For any organization looking to make a successful digital transformation, cybersecurity must be a top priority—hard stop. Damages and data loss related...