Kedi RAT Transfers Data via Gmail
Sophos security researchers have found a new remote access Trojan (RAT) which can evade security scanners and communicate with its […]
Kedi RAT Transfers Data via Gmail Read More »
Sophos security researchers have found a new remote access Trojan (RAT) which can evade security scanners and communicate with its […]
Kedi RAT Transfers Data via Gmail Read More »
Security researchers alerted that billions of Windows, Android, Linux and iOS devices which use Bluetooth could be affected by a
New Bluetooth Attack Threatens Billions of Devices Read More »
Hackers can remotely access Smiths Medical Syringe Infusion Pumps to kill patients, the US-CERT alerted. The 4000 wireless infusion pumps
Smiths Medical Syringe Infusion Pumps Can be Controlled by Hackers Read More »
The enSilo security researchers warn that a kernel bug which has been impacting Windows systems over the past decade and
Windows Kernel Bug Attacks Windows Systems Read More »
The Shadow Brokers hacker group keeps offering tools and exploits which they steal from the U.S. National Security Agency (NSA).
Shadow Brokers Group Releases a Hacking Tool Used by NSA Read More »
Fortinet security experts warn that hackers are exploiting malicious PowerPoint files alongside recently patched Microsoft Office vulnerability to attack foreign
Hackers Exploit PowerPoint Files to Deliver Malware Read More »
The CynoSure Prime group is back and managed to expose 320 million hashed passwords dumped to the security researcher Troy
320 Million Hashed Passwords Reversed by the CynoSure Prime Group Read More »
Almost 300 Android applications have been removed from the official Google Play Store after ESET researchers reported that they were
300 Android Apps Involved in a DDoS Attack Removed from the Google Play Store Read More »
Another secret CIA project for compromising Windows systems has just been revealed by WikiLeaks. The new project was targeting the
CIA Malware Project Infects Windows Systems Read More »
Security experts have recently spotted another version of Locky ransomware called IKARUSdilapidated. The ransomware source is a botnet of zombie
PC Users Hit by New Version of Locky Ransomware Read More »
Kasperky Lab researchers have found that a recent modification of the Neutrino banking trojan reuses NukeBot source code parts. The
NukeBot Source Code Reused by Jimmy Banking Trojan Read More »
A cyber espionage campaign against India and Pakistan has been recently found by the security firm Symantec. Considering the attackers’
State-sponsored Cyber Espionage Campaign Attacked India and Pakistan Read More »
An iOS Kernel Exploit PoC released by the Zimperium security researcher Adam Donenfeld, can be used to fully control iOS
iOS Kernel Exploit PoC Can Fully Control iOS Mobile Devices Read More »
Cyber criminals can turn a harmless email into a malicious one even after it has been received by victims thanks
Ropemaker Attack Turns Harmless Emails into Malicious Ones Read More »
Security researchers from FireEye published a report stating that the Neptune exploit kit have been exploited by hackers for delivering
Neptune Exploit Kit Delivers Cryptocurrency Miners via Malvertising Campaigns Read More »