Cyber security specialists spotted two Satan Malware variations focusing on associations in the monetary segment with Monero excavators and ransomware. The main variation of the malware, which security researchers seen toward the beginning of November, targets Linux and Windows frameworks and spreads by misusing different application vulnerabilities. In the wake of building up a...Continue Reading
Since 2017, the amount of ransomware incidences have become increasingly rampant and progressive. TFlower Ransomware concentrated their assaults against company networks, infiltrating the very core of everyday business operations. There was a slight decline in the number of attacks from last year but came 2019, these business-targeting malwares have accelerated their assault in a...Continue Reading
Scammers and cyber criminals attacked kid’s charity – Save the Children Federation, a well-known U.S. charity, into sending them approximately one million dollars. The attacker managed to access an employee’s email account and from there sent fake invoices and other documents designed to trick the organization into sending the money. Whatever online website scanners or...Continue Reading
Last February 2019, Security researchers identified several spear phishing emails sent in November 2018 containing new malware that shares infrastructure with playbooks associated with North Korean campaigns. The spear phishing emails were written to appear as though they were sent from a nuclear security expert who currently works as a consultant for in the U.S....Continue Reading
Nigerian business email compromise scams are growing more dangerous and sophisticated as cybercriminals add new tools and techniques to their arsenal such as remote access trojans (RATs) and advanced information stealers. But even beyond soaring cybercriminal incidents, criminals are becoming less of a pesky threat, such as Nigerian Prince 419-style email scams, and more dangerous....Continue Reading
Analysis of new malware samples used by the Rocke group for cryptojacking reveals code that uninstalls from Linux servers multiple cloud security and monitoring products developed by Tencent Cloud and Alibaba Cloud. Rocke’s goal is to compromise Linux machines and use them to mine for Monero cryptocurrency. They exploit several vulnerabilities in Apache Struts...Continue Reading
Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server. ...Continue Reading
The popular series’ – Game of Thrones’ – fans have been eagerly awaiting the weekly episodes of this wildly popular series in its final season. With this anticipation and enthusiasm for the show, comes an opportunity for phishing scam and hacker attacks. This week, security researchers from well-known firms cited Game of Thrones as...Continue Reading
Several enterprise VPN apps are vulnerable to a security bug that can allow an attacker to remotely break into a company’s internal network, according to a warning issued by The Department of Homeland Security’s cybersecurity division. An alert was published Friday by the government’s Cybersecurity and Infrastructure Security Agency following a public disclosure by CERT/CC,...Continue Reading
The world of cybersecurity is full of surprises. From using and downloading your Game of Thrones torrents to exploiting popular porn websites — notorious cybercriminals keep coming up with new ways to cause you harm. In a related development, a ransomware called RobinHood is spreading havoc in North Carolina, where the ransomware has crippled most...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.