Cybersecurity services specialists reported a ransomware attack that temporarily affected the operations of the community radio station WMNF 88.5 – FM, based...
The EvilGnomes Linux malware has been linked to infamous Russian threat actors from the Gamaredon Group. The IT security researchers at Intezar...
Infamous Turla APT Hackers group renew its arsenal with a new hacking tool named “Topinambour ” also called as aka Sunchoke that...
We admit here in hackercombat.com, we are one of the cybersecurity news organizations that somewhat hyped Artificial Intelligence (AI) when it comes...
Security researchers have discovered a rare piece of Linux spyware that’s currently fully undetected across all major antivirus security software products, and...
Last Valentines day, we made a fearless declaration here in Hackercombat.com, that Trickbot is shaping itself of becoming the “malware of the...
Popular malware TrickBot is back and this time it has learned some new capabilities like stealing cookies. So far, it has infected...
A new Mirai variant dubbed Miori uses text-based protocols to establish communication with command-and-control (C&C) servers. The Miori campaign was identified in...
Officials at Monroe College, a private university based in New York, recently reported a cybersecurity incident that affected its operations. According to...
Agent Smith malware exploits Android vulnerabilities to target unsuspected users for credential stealing. The IT security researchers at CheckPoint have discovered a...
An Infamous Cyberespionage group known as “Buhtrap” uses a Windows Zero-day exploit for its new campaign to attack businesses and perform targeted attack...
Breaking into a cybersecurity career is no different than any other career path or profession. In fact, in some ways, we’d even...
Have you ever received emails from unknown sources claiming to offer insurance, lottery tickets or advertisements? You may have noticed that such...
More than 25 million Android phones have been infected by a new malware “Agent Smith,” masquerading as popular apps such as WhatsApp,...
A new ransomware strain dubbed eCh0raix targeting Linux based QNAP Network Attached Storage (NAS) devices. The ransomware intended to infect and encrypt...
Hackers broke the file server of the Pale Moon browser project and attacked the previous version of the browser with malicious software....
An investigation conducted by system audit specialists from the security firm Check Point has revealed the existence of new smartphone malware; dubbed...
One of the most powerful, infamous, and advanced piece of government-grade commercial surveillance spyware dubbed FinSpy—also known as FinFisher—has been discovered in...
An estimated 2 million cyberattacks took place in 2018 costing more than $45 billion in damages worldwide. The worse part is that...
A widespread fileless malware campaign called Astaroth spotted with the “lived off the land” method to attack Windows users with advanced persistent...
In a recent blog post, the Microsoft Defender ATP research team issued a warning about a harmful file-less malware campaign called Astaroth....