Researchers have detected a new zero-day bug which uses a previously unknown flaw in Microsoft Word. The bug allows attackers to send malicious document...
Short Bytes: The latest addition to the Vault 7 leak by CIA is the set of 27 documents of the Grasshopper framework....
[jpshare]Security Experts from Avast came through a Malware that uses a sandbox(DroidPlugin) to dynamically load and run an app, without actually installing...
You may remember Shadow Brokers hacking group for selling a trove of hacking tools and exploits stolen from the NSA’s Equation Group...
There is a preconceived idea that malvertising mostly affects the Windows platform. Certainly, when it comes to malicious adverts, Internet Explorer is...
A group of hackers is performing highly sophisticated cyber-attacks against high-profile organizations of Middle East – Cyber security firms Palo Alto Networks...
A new malware strain called BrickerBot is bricking Internet of Things (IoT) devices around the world by corrupting their storage capability and...
The malware can snoop on people’s conversations, act as keylogger, take screenshots, control camera and microphone. A new Android RAT malware was...
A few days ago Skype users noticed that the instant messaging service served a malicious malware masquerading as fake Flash player update. Several users...
Short Bytes: A team of researchers at Kaspersky Labs have recently cracked the mystery of a fileless malware that was used to...
Short Bytes: Continuing their CIA leak further, Wikileaks has released a part of CIA Core Library called Marble Framework. It is used...
A new ransomware app has been spotted in the wild, which could easily bypass your mobile anti-virus allowing the app to lock...
A new series of malware attacks has occurred, and this time, the targets are the owners of Github repositories. Developers who own...
Scientists from two Israeli universities have come up with a way to use flatbed scanners as relay points when sending commands to...
The author of the Nuclear Bot banking trojan has leaked the source code of his own malware in a desperate attempt to...
A couple of months ago we reported about an Android-based LG Smart TV had its screen bricked after a critical ransomware infection....
Hackers have designed a new bot named Giftghostbot which is being used to defraud thousands of gift card owners. As per reports, these...
Security researchers from Malwarebytes have discovered a new malvertising campaign targeting visitors of several adult websites, spreading the Ramnit trojan and focusing...
The vast majority of malware incidents that take place at industrial facilities around the world are just accidental infections, albeit a very...
Malware authors in China are using fake base transceiver stations (BTSs), which is equipment usually installed on cellular telephone towers, to send...
A new technique named DoubleAgent, discovered by security researchers from Cybellum, allows an attacker to hijack security products and make them take...