Cyber Security researchers have just discovered a new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies. Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the...Continue Reading
The stealthy North Korean APT group dubbed DarkHotel, otherwise known as APT-C-06, Fallout Team, SIG25, and so on, has been progressively focusing on Internet Explorer (IE) scripting motor. Security specialists as of late found that DarkHotel made new endeavors for two more seasoned vulnerabilities influencing the Internet Explorer scripting motors. Despite the fact that...Continue Reading
A malware-bound Android application was discovered hanging around on Google Play for very nearly a year. Amid this time, the malignant application was accessible for download by all Google Play clients. The malware was covered up in an application named “Simple Call Recorder”, distributed by the FreshApps Group. At the season of disclosure, the...Continue Reading
Security researchers over the globe joined in a venture committed to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. The task called URLhaus was started by abuse.ch, a non-benefit cybersecurity association in Switzerland. The operations began towards the end of March 2018 and recorded...Continue Reading
Unfortunately for Android smartphone users coming from developing countries with usually low privacy protections, a cheap smartphone could come with a hidden cost: Low-end Android smartphone devices mostly sold at developing markets such as Egypt, Brazil, South Africa, Myanmar, etc., contain pre-installed malware. The malware to blame is com.rock.gota, but it masks itself quite ingeniously...Continue Reading
As a Dark web expert with an expertise in monitoring tor sites and hidden services, We have been encountering many contents that are disturbing and straightforward illegal being peddled around the internet both surface and deep part of the web. A researcher like me discover that these things are the usual in the dark web...Continue Reading
Another investigation of the pernicious PC code utilized in a messed up assault on a Saudi petrochemical plant reasons that a great part of the exertion was composed from inside a state-claimed Russian logical establishment, a standout amongst the most immediate connections between authority Russian programmers and an unfriendly interruption on a noteworthy bit of...Continue Reading
High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics A new Windows malware is adding systems into a botnet. It takes absolute control of its victims and also deliver additional malicious payloads. As far as the investigation goes, whoever’s the author of Mylobot malware campaign has to be a sophisticated and certainly capable hacker. To understand...Continue Reading
Visiting Google, Apple, Amazon or other legitimate online markets for downloading software content are, at best, safe. But although they are official sources we’ve come to fully accept and familiarize about, these are things which aren’t 100% safe. Take for example, a recent Google Chrome Extension called “Desbloquear Conteúdo” (Portuguese for “Unblock contents”), masquerades as...Continue Reading
Cracked Software for Free? It has been a long time since piracy became rampant exploiting software such as operating systems, productivity tools, and entertainment programs like games that were pirated by “Pirates” through code cracking, and then redistributing them for free with some special instructions in order to access the premium software for “free”. For...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.