Category

anti malware programs
Anti-malware tools
Cybersecurity scientists have found a basic weakpoint in the broadly utilized SQLite database programming that uncovered billions of deployments to cyber criminals.   Named as ‘Magellan’ by security researchers, the newfound SQLite imperfection could enable remote assailants to execute self-assertive or malignant code on influenced gadgets, spill program memory or crash applications.   SQLite is...
Continue Reading
Malicious hackers break into NASA’s network systems
The U.S. National Aeronautics and Space Administration (NASA) published an audit document from the U.S. Office of the Inspector General confirming that its Jet Propulsion Laboratory (JPL) has been hacked this week. Based on the audit report, it was found out that the cybercriminals hacked multiple IT security control reducing JPL’s ability to prevent, detect,...
Continue Reading
Rowhammer attack
International academic researchers discovered a new variant of the Rowhammer attack,which they named asRAMBleed,that can be performed even if a system is patched against Rowhammer. The unfamiliar attack of this RAMBleed is that it targets devices to steal information, contrary to other Rowhammer attacks that alter existing data or elevate an attacker’s privileges. As many...
Continue Reading
anti malware
Summary Security vulnerability that was discovered in Microsoft’s Remote Desktop Protocol (RDP), that allow for the possibility of remote code execution via BlueKeep. NSA urges to update their system to prevent a re-run of attacks coincide 2017 ransomware outbreaks. Analysis A wormableremote code execution vulnerability first found in the wild on May 14,2019 with CVE-2019-0708,...
Continue Reading
best virus malware protection
Malware Summary Qakbot or Qbot also known as bank malware has been in the threat landscape since 2008 similar to Rubber Ducky, Mimikatz, and is considered one of the most effective malware families of the past decade, in part because its source code is available to cybercriminals, so it can be easily modified and extended....
Continue Reading
Ransomware
Hopkins International Airport is battling a ransomware attack that knocked out some displays and disabled email, according to multiple reports from Cleveland, Ohio. Hopkins International Airport is the largest and busiest airport in Ohio, and the 43rd busiest airport in the United States by passenger numbers, according to Wikipedia.   The City of Cleveland and...
Continue Reading
CARBANAK Banking Malware
What do we know about Carbanak malware As we all know Carbanak has its impressive portfolio holding in its reputation, considering it as the leading player for Advanced Threat Protection attack and believed to be one of the successful attack in the world used entirely for banks, financial institutions, hospitals, and restaurants. First seen on...
Continue Reading
Macos Malware
Malware creators are continually searching for new and inventive approaches to stay away from location and increment benefits, so a report that an evidently new method was being conveyed against macOS clients a week ago made them start up our Virtual Machines to perceive what our foes had concocted this time.   Old Dog, New...
Continue Reading
CryptoJacking
Malicious cyber criminals have just utilized a Canadian college’s system to do a huge cryptojacking effort. Nova Scotia’s St. Francis Xavier University found the assault a week ago and handicapped its system to remove the assault. The programmers allegedly introduced a malware to direct the assault.   In a statement released on Nov. 4, the...
Continue Reading
cryptocurrency mining malware
Cyber Security researchers have just discovered a new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.   Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the...
Continue Reading
1 2 3