Foxit Software, the company behind the highly popular Foxit Reader, has published security updates to fix a high severity remote code execution (RCE) vulnerability affecting the...
An unknown threat actor used a new stealthy rootkit to backdoor targeted Windows systems what looks like an ongoing espionage campaign dubbed TunnelSnake going back to at least...
The Mauritian government is considering plans to monitor and censor social media by intercepting web traffic. In a consultation document (PDF), the country’s Information and Communication Technologies Authority...
The stealthy backdoor is likely being used by Chinese APTs, researchers said. A previously undocumented backdoor malware, dubbed PortDoor, is being used by a probable Chinese...
UNICC and Group-IB detected and took down a massive multistage scam campaign circulating online on April 7, World Health Day. Group-IB, a global threat hunting and adversary-centric cyber...
Passwords stored in enterprise password manager Passwordstate may have been “harvested” by attackers who planted a malicious software update file, the application’s developer, Click Studios, has...
The FBI and German police orchestrated the wholesale removal of remnants of the Emotet malware strain from previously infected Windows systems on Sunday (April 25). The action was...
Emotet, one of the most dangerous email spam botnets in recent history, is being uninstalled today from all infected devices with the help of a malware...
The exploitation of ProxyLogon vulnerabilities in Microsoft Exchange servers has exploded to an extent that threat actors are modifying their attacks to distribute a variety of...