The North Korea-affiliated group Kimsuky’s email attacks targeted research and media organizations. A bilateral coalition of security agencies issued a...
Project Zero, Google’s 0day bug-hunting team, shared technical details and proof-of-concept (PoC) exploit code for a critical remote code execution (RCE) bug affecting a Windows graphics...
The release of Android 11 is a breakthrough for operating systems, with some experts calling it the most dynamic and resilient OS to date. You can...
The number of attacks had slowed down after the winter holidays, but after the past two weeks, it’s evident that the ransomware attacks are back at...
Cryptocurrency scammers have made at least $145,000 this week by promoting fake giveaways through hacked verified Twitter accounts. Last month, we reported an increasing trend where...
Malwarebytes recently disclosed malicious activities belonging to a previously unidentified actor. This unidentified actor has been named as LazyScripter and is active since 2018. What has...
A recent cryptomining botnet campaign has been observed using Bitcoin blockchain transactions to hide its backup C2 IP addresses. It’s a very effective way of staying...
Recently, Unit 42 researchers have come across the most sophisticated, well-engineered, and difficult-to-detect polymorphic malware. About the malware Dubbed BendyBear by experts, the malware is possibly...
A hacking group called ‘Hotarus Corp’ has hacked Ecuador’s Ministry of Finance and the country’s largest bank, Banco Pichincha, where they claim to have stolen internal...
French multinational information technology services and consulting company Atos has completed the acquisition of two cybersecurity companies. On February 24, the self-styled decarbonization services and products pioneer announced...
There’s been a 2,000% increase of new malware written in Go over the past few years. The number of malware strains coded in the Go programming...
Recent Comments