All 9 malicious apps were found on Google Play Store. In recent news, a research team of malware analysts from Dr. Web...
Reportedly, the Windows Defender daily update flagged DeCSS DVD encryption software copy as a Trojan and quarantined it before deleting it after...
The suspect, Mihai Ionut Paunescu, was already arrested by the Romanian authorities in December 2012 but managed to avoid extradition to the...
Researchers at security firm Sonatype have uncovered six malicious typosquatting packages in the official Python programming language’s PyPI repository, laced with cryptomining malware. Sonatype...
The Meteor file wiper malware is linked to a cyberattack that took place on July 9th, 2021 on the Iranian railway system...
As if we didn’t have enough threats on our plate to deal with. Did you know in 2018, ransomware attacks worldwide grew...
The newly discovered DarkRadiation ransomware chain is unlike any other ransomware family. Trend Micro cybersecurity researchers have shared findings of a newly identified ransomware...
The total amount of data collected by the malware includes nearly 26 million login credentials holding 1.1 million unique email addresses, 2...
Cybercriminals have started employing a new phishing attack that abuses the popularity of Google Drive and Docs to bypass security filters. In...
The researchers managed to identify and report the presence of Joker malware in 8 apps on Google Play Store. In the past...
Dubbed Vigilante by researchers; the malware prevents the system from those sites that redistribute pirated software/data. The IT security researchers at SophosLabs have...
The operators behind the REvil ransomware-as-a-service (RaaS) staged a surprise return after a two-month hiatus following the widely publicized attack on technology...
The work-from-anywhere economy has opened up the possibility for your human resources team to source the best talent from anywhere. To scale...
Microsoft on Tuesday warned of an actively exploited zero-day flaw impacting Internet Explorer that’s being used to hijack vulnerable Windows systems by...
An ongoing campaign has been found to leverage a network of websites acting as a “dropper as a service” to deliver a...
A recent wave of spear-phishing campaigns leveraged weaponized Windows 11 Alpha-themed Word documents with Visual Basic macros to drop malicious payloads, including...
The operators of the Mozi IoT botnet have been taken into custody by Chinese law enforcement authorities, nearly two years after the...
Threat actors are capitalizing on the growing popularity of proxyware platforms like Honeygain and Nanowire to monetize their own malware campaigns, once...
The security analysts from the cybersecurity firm Bitdefender have recently noted the new backdoor BADHATCH malware that was being used by the...
A financially motivated threat actor notorious for setting its sights on retail, hospitality, and entertainment industries has been observed deploying a completely...
A computer retail company based in the U.S. was the target of a previously undiscovered implant called SideWalk as part of a...