It seems that WannaCry had a predecessor that apparently carried out attacks which involved mining the cryptocurrency Monero using the same vulnerability...
Security researchers from Sucuri have found hacked WordPress sites that were altered to secretly siphon off cookies for user and admin accounts...
WikiLeaks recently leaked some files as part of its Vault 7 series, that contained user manuals for two malware called, Assassin and...
Earlier today, Microsoft’s President and Chief Legal Officer, Brad Smith stated that part of the responsibility of the recent WannaCry ransomware attack...
In the last few days, the internet has been caught off guard with numerous updates being posted regarding the sprawling effects of...
Internet users worldwide are now familiar with the WannaCry or WanaCrypt0r ransomware attack and how cybercriminals used it to infect cyber infrastructure...
Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the...
Short Bytes: The hackers have used the leaked NSA tools to infect computers with WanaCrypt0r 2.0 ransomware. This malware exploits EternalBlue vulnerability and uses...
Security researchers have warned that HP machines could turn into a spyware thanks to an audio driver developed by Conexant Systems, Inc. which...
[jpshare]A new Android vulnerability discovered in Android’s security Mechanism which leads to several android permission based attacks during run-time including ransomware, banking malware...
Malwaresearch is a command line tool to find malware on Openmalware.org, it was developed to facilitate and speed up the process of finding and...
We are quite used to seeing hackers using ransomware apps to trick unsuspecting users into paying ransoms. But, in Thailand instead of...
Earlier this week, the research team which is part of Windows Defender Advanced Threat Protection system, detected several attacks being carried out...
The security researchers at Fox-IT have discovered a modified version of the previously known snake malware. A version specifically designed to target...
Recorded Future, a threat intelligence company together with Shodan, which is an internet search engine connecting services to internet devices, have created...
Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool...
A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or...
A new warning has been issued by IBM and the situation seems to be rather serious. According to the firm, there are...
Symantec, an IT security and software company, has released the latest volume of Internet security threat report and some of the facts...
People regularly anticipate that in case you’re strolling OSX, you’re highly secure from malware. But that is turning into much less and...
People often assume that if you’re running OSX, you’re relatively safe from malware. But this is becoming less and less true, as...