According to MalwareBytes’s 2019 State of Malware Report, Trojans and crypto miners are the dominate malware threats of 2019. Android phones may...
The victims of ShadowHammer malware attack are Windows users. Kaspersky Lab researchers have made a startling new revelation that the world’s leading computer...
Ransomware is a type of malware which encrypts the user’s file until he/she does not hand over a designated sum of ransom. However,...
Beware! If you are using UC Browser on your smartphones, you should consider uninstalling it immediately. Why? Because the China-made UC Browser...
Lockergoga infection was first spotted in January 2019, the ransomware particularly targets on critical infrastructure. The Lockergoga ransomware encrypts all the files...
Cyber Criminals abused the worlds largest computer maker ASUS computers software update tool by hijacking the company server and install the malware....
According to the authors of the book ‘Learn ethical hacking’, a group of hackers has infected hundreds of thousands of Asus computers...
Remember the CCleaner hack? CCleaner hack was one of the largest supply chain attacks that infected more than 2.3 million users with...
Sophisticated AZORult Malware emerges in a new form with advanced information stealing modules that capable of stealing sensitive information from infected computers....
The Pirate Bay is one of the leading copyright-protected content download platforms. According to an expert from the best ethical hacking Institute...
Subscribers to the PewDiePie YouTube channel have decided to take drastic steps to make the famous content creator consolidate as the user...
T-Series – PewDiePie Battle Takes an Ugly Turn- PewDiePie Fans Launching PewDiePie ransomware to Get Followers. The battle between T-Series and PewDiePie...
Obsession really goes a long way for people to get out of their way to cause trouble for others. As PewDiePie emerges...
Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250[6]) to hide the njRAT backdoor and targeting users reside in the...
The IT security researchers at Palo Alto Networks’ Unit 42 have discovered a malware that has been targeting Israeli cyberspace especially those dealing...
Extensive Ransomware Attack forced to shut down operations at, Norsk Hydro, one of the world’s largest aluminum producers. The company suffered production...
According to a blog post from threat research department Unit 42 of cyber security company Palo Alto Networks published on March 19,...
A brand new JNEC.a ransomware spreading via recently discovered WinRAR vulnerability exploit to compromise windows computer & demand the ransom amount. This...
Mirai malware is a powerful strain that compromises a number of Linux devices and uses those devices to launch a massive distributed...
attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based on Proofpoint...
Cyber criminals now approaching a unique way to spread Powload malware with the help of steganography to infect the targeted system. Powload...