Chinese hackers breached into the systems of Australian National University (ANU) and according to the experts they are still there. Chinese hackers continue to target organizations worldwide, this time attackers based in China breached into the systems of Australian National University (ANU), one of the most prestigious Australian universities. The bad news is that experts are still working to […]
Ex-employee at the surveillance firm NSO Group has been arrested and charged with stealing phone hacking tools from the company and attempting to sell it. A former employee of one of the most popular surveillance firm, NSO Group, has been arrested and charged with stealing phone hacking tools from the company and attempting to sell […]
Israeli military intelligence accused Hamas operatives of creating tainted apps to lure soldiers into downloading spyware onto their phones. According to a report published by the Israeli military, Hamas hackers are attempting to lure Israel Defence Forces (IDF) soldiers into installing tainted apps on their devices. Israeli military already blamed Hamas of similar attacks, but this […]
Recently experts from Talos security spotted a malware campaign leveraging Smoke Loader to steal credentials from a broad range of applications. Security experts have discovered a new malware campaign leveraging Smoke Loader to steal credentials from web browsers, email clients, and other popular applications. The attack chain starts with messages using a weaponized Word document […]
The Thunderbird team released a new version of the popular email client that addresses many security issued, including the EFAIL vulnerability. Thunderbird has released a new version to address a dozen security vulnerabilities, including the EFAIL encryption issue that was discovered in May. The new version addresses two EFAIL-related issues in the way Thunderbird handles […]
Thereâs a prevailing mindset that suggests if organizations ban all the things that pose risks to overall cybersecurity, theyâre taking the most effective approach to make their organizations secure. Initially, that line of thinking seems sensible in some regards. After all, if the aspects that threaten cybersecurity aren’t allowed at all, the problems they pose […]
Crooks leverage an alternative scheme to mine cryptocurrencies, they don’t inject the CoinHive JavaScript miner directly into compromised websites. Security researchers at MalwareLabs have uncovered a new crypto mining campaign that leverages an alternative scheme to mine cryptocurrencies, differently from other campaigns, crooks don’t inject the CoinHive JavaScript miner directly in compromised websites. CoinHive also […]
Rainway reported that tens of thousands of Fortnite players have been infected with an adware while downloading fake v-buck generators Fortnite continues to be one of the most popular game and crooks are attempting to target millions of fans in different ways. In June, experts observed cyber criminals attempting to exploit the interest in forthcoming Fortnite […]
A new variant of the infamous GandCrab ransomware V4 was released during the weekend, experts shared details of the threat, A new version of the dreaded GandCrab ransomware (V4) was released during the weekend and according to the experts it included numerous changes. New #GandCrab version "V4" GANDCRAB V4 Ransomware â Remove and Restore .KRAB […]
Huawei has rolled out security fixes for some enterprise and broadcast products to address a cryptography issue tracked as CVE-2017-17174. Huawei has released security updates for some enterprise and broadcast products to address a cryptography issue that was discovered in late 2017. The vulnerability, tracked as CVE-2017-17174, is related to the implementation of an insecure encryption […]