The CCleaner App Compromised Before Launch
The popular CCleaner application was hijacked and compromised to steal information from its users and send it to unknown individuals, […]
The CCleaner App Compromised Before Launch Read More »
The popular CCleaner application was hijacked and compromised to steal information from its users and send it to unknown individuals, […]
The CCleaner App Compromised Before Launch Read More »
Security experts have found a new sms malware called ExpensiveWall. After discovering the infection, Google had to remove 50 malicious
Millions of Android Handsets Infected by the ExpensiveWall Malware Read More »
Sophos security researchers have found a new remote access Trojan (RAT) which can evade security scanners and communicate with its
Kedi RAT Transfers Data via Gmail Read More »
Security researchers alerted that billions of Windows, Android, Linux and iOS devices which use Bluetooth could be affected by a
New Bluetooth Attack Threatens Billions of Devices Read More »
Hackers can remotely access Smiths Medical Syringe Infusion Pumps to kill patients, the US-CERT alerted. The 4000 wireless infusion pumps
Smiths Medical Syringe Infusion Pumps Can be Controlled by Hackers Read More »
The enSilo security researchers warn that a kernel bug which has been impacting Windows systems over the past decade and
Windows Kernel Bug Attacks Windows Systems Read More »
The Shadow Brokers hacker group keeps offering tools and exploits which they steal from the U.S. National Security Agency (NSA).
Shadow Brokers Group Releases a Hacking Tool Used by NSA Read More »
Fortinet security experts warn that hackers are exploiting malicious PowerPoint files alongside recently patched Microsoft Office vulnerability to attack foreign
Hackers Exploit PowerPoint Files to Deliver Malware Read More »
The CynoSure Prime group is back and managed to expose 320 million hashed passwords dumped to the security researcher Troy
320 Million Hashed Passwords Reversed by the CynoSure Prime Group Read More »
Almost 300 Android applications have been removed from the official Google Play Store after ESET researchers reported that they were
300 Android Apps Involved in a DDoS Attack Removed from the Google Play Store Read More »
Another secret CIA project for compromising Windows systems has just been revealed by WikiLeaks. The new project was targeting the
CIA Malware Project Infects Windows Systems Read More »
Security experts have recently spotted another version of Locky ransomware called IKARUSdilapidated. The ransomware source is a botnet of zombie
PC Users Hit by New Version of Locky Ransomware Read More »
Kasperky Lab researchers have found that a recent modification of the Neutrino banking trojan reuses NukeBot source code parts. The
NukeBot Source Code Reused by Jimmy Banking Trojan Read More »
A cyber espionage campaign against India and Pakistan has been recently found by the security firm Symantec. Considering the attackers’
State-sponsored Cyber Espionage Campaign Attacked India and Pakistan Read More »
An iOS Kernel Exploit PoC released by the Zimperium security researcher Adam Donenfeld, can be used to fully control iOS
iOS Kernel Exploit PoC Can Fully Control iOS Mobile Devices Read More »