Cybersecurity scientists have found a basic weakpoint in the broadly utilized SQLite database programming that uncovered billions of deployments to cyber criminals. Named as ‘Magellan’ by security researchers, the newfound SQLite imperfection could enable remote assailants to execute self-assertive or malignant code on influenced gadgets, spill program memory or crash applications. SQLite is...Continue Reading
Summary Security vulnerability that was discovered in Microsoft’s Remote Desktop Protocol (RDP), that allow for the possibility of remote code execution via BlueKeep. NSA urges to update their system to prevent a re-run of attacks coincide 2017 ransomware outbreaks. Analysis A wormableremote code execution vulnerability first found in the wild on May 14,2019 with CVE-2019-0708,...Continue Reading
A malicious downloader malware called Smoke Loader, which sporadically infected victims since 2011, has gotten active this year with a new method to spread the infection to Windows users. Like most malware, it tricks the victim into downloading a sketchy Microsoft Word document from a spam invoice email with unknown sender, and then prompts the...Continue Reading
Rakhni, an old ransomware dating as far back as the year 2013, recently stepped up its game by adding a new devastating algorithm with its arsenal of attacks. It now decides whether to demand ransomware or secretly profit by installing a miner. How It Works The malware is shared via email attachment, often disguised as...Continue Reading
Watch out for browser extensions this time Previously we have been talking about mobile apps mostly on the Android environment that are being used to hijack malware into some legitimate looking apps in order to deploy different scripts to steal as much data to extort money either by combining phishing attack strategies or directly snoop...Continue Reading
Cybercriminals have a large range of tools and resources to launch phishing and malware attacks against online platforms. The dark web provides fertile grounds for criminals to opening discuss methodologies and trade new malware variants, types and processes. From well-established banking malware, such as Dyre, ZeuS and Kronos, to more recently discovered malware, such as...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.