Pirate content is being used to distribute malware The episodes of Game of Thrones are the most popular bait used by malicious...
Security researchers from ESET found first ever APT28 group used UEFI rootkit in wild. The Sedint group behind several high profile attacks...
The business of IT comes with its own strength and weaknesses. The job of system administrators is usually only seen with a...
The VPNFilter malware is a globally deployed threat infected thousands of network devices across the globe, it is a multi-stage, modular platform...
Android is one of the most vulnerable mobile operating systems with hackers developing new Android malware and banking trojan every 17 seconds....
A security researcher from ESET has announced that he has unearthed new Android-based spyware that is capable of accessing the Whatsapp database...
A new Android Banking Trojan found on Google play with more than 10,000 installs steals user’s banking credentials and also capable of...
Malware authors continue to upload malicious apps contains hidden Cryptomining Script to Google play, even though it was entirely banned. Attackers uploaded...
Attackers are spreading macros in a campaign aimed at users of freelance/occasional work platforms A new cyberattack campaign has specially focused on...
Hackers abuses cloud hosting services to distribute Stealer Malware by mixing it up with good ones to prevent the malware from getting...
Unfortunately, unsuspected freelancers are falling for the malware scam. Fiverr and Freelancer.com are two of the most popular websites for freelancers and...
DanaBot Banking Trojan was discovered earlier this year by Proofpoint, targeting users in Australia through continuous malicious email campaigns, later it expands...
Ruslans Bondars, 38, sentenced 14 years in Jail for running Malware Scanning Service “Scan4you” that helps for malware authors to scan their...
Scan4You was a VirusTotal like platform used for malicious purposes. A 37-year old male from Riga, Latvia has received 14 years sentence...
The three hackers who controlled the notorious Mirai botnet was sentenced last year in a conspiracy to violate the Computer Fraud &...
Hackers uploaded finance based fake apps into the Google play store to steal credit card details and login credentials to the targeted...
Researchers at Palo Alto Networks have found a new malware called Xbash which is a lethal cocktail of botnet, ransomware and cryptocurrency mining software...
Cybercriminals using a new type of attack called Evil clone to inject Cryptocurrency malware into legitimate PDF software to Mine cryptocurrency with...
At the moment, it is unclear how many Newegg customers have been impacted. The IT security researchers at RiskIQ and Volexity have announced...
New research reveals that Israel based NSO Group using powerful mobile based Pegasus Spyware to conducting massive surveillance in 45 countries across...
Among the ten major cyber threats identified by BSI in 2016, the use of portable peripheral devices ranks second. While the same agency suggests engaging...