Category

Anti-Malware Solution
cybersecurity
Several enterprise virtual private networking apps are vulnerable to a security bug that can allow an attacker to remotely break into a company’s internal network, according to a warning issued by The Department of Homeland Security’s cybersecurity division.   An alert was published Friday by the government’s Cybersecurity and Infrastructure Security Agency following a public...
Continue Reading
Tech Data Suffers Major Data Leak
An American IT Giant has fixed a “major” data leak that exposed payment, invoice, account and contact information for the company’s reseller and MSP partners. It wasn’t clear if it’s a hacking incident or malware-related intrusion.   The Clearwater, Fla.-based IT distribution giant leaked some 264 gigabytes of client and employee corporate and personal data,...
Continue Reading
Website Vulnerability
The city of Columbia site had a security flaw in its search tool, according to independent security researchers. The flaw lets anyone view passwords for the website’s database and email protocol servers, creating a massive potential for abuse, researchers said on Thursday.   The vulnerability made it possible for someone to pull sensitive data out...
Continue Reading
Website Malware protection
Security researchers over the globe joined in a venture committed to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. The task called URLhaus was started by abuse.ch, a non-benefit cybersecurity association in Switzerland. The operations began towards the end of March 2018 and recorded...
Continue Reading
Government Malware Online
Joint effort In an effort to improve information sharing Cybersecurity professional Russian is now the recipient of this so called “enemies files” from US CYBERCOM. This may have been ironic as enemy usually dump files, this time Russia began publicly freeing unclassified samples of adversaries’ malware it has found out. As per Joseph R. Holstead, acting director...
Continue Reading
New Malware Can Turn Android Devices into Hidden Proxies
Another Android malware named TimpDoor has been found by security specialists. The malware is being circulated as a major aspect of a phishing effort and is being sent to exploited people’s SMS messages. The aggressors behind the battle trap exploited people into downloading and introducing a phony voice-message application that contains TimpDoor. Once the malware-bound...
Continue Reading
Mac Malware Targets Crypto-Community Forums
OSX.Dummy: Mac Malware Targets Crypto-Community Forums Attackers posing as admins are asking users from crypto-community channel forums of Slack and Discord to infect themselves with malware through the use of simple, and rather dumb, social engineering tactics. Mac researchers agreed naming the malware OSX.Dummy, for a reason. The following command was shared to unknowing crypto...
Continue Reading
SamSam Ransomware
SamSam Ransomware is back with New Variant Considered as the most infamous and well-known ransomware today, which alone stole over $325,000 in just 4 weeks since its first appearance last January, SamSam ransomware is back with a new plot in mind. Now it asks for the attacker’s password first before infection. Researchers found this particular...
Continue Reading
Windows Malware Mylobot
High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics A new Windows malware is adding systems into a botnet. It takes absolute control of its victims and also deliver additional malicious payloads. As far as the investigation goes, whoever’s the author of Mylobot malware campaign has to be a sophisticated and certainly capable hacker. To understand...
Continue Reading
Tech Support Scams
It is undeniably normal and, in most cases, smart that we seek help from tech support for any hardware/software issues we come across with, but with how scammers evolved lately, it is not surprising even tech support scams are on a dramatic rise over the last couple of years. Based on the records released by...
Continue Reading
1 2

Categories