Hacking

LimeRAT spreads in the wild

Cybaze-Yoroi ZLab team spotted an interesting infection chain leveraging several techniques able to defeat traditional security defences and spread LimeRAT.…

7 years ago

Gulf countries came under hackers’ spotlight in 2018, with more than 130 000 payment cards compromised

Bahrain, 08.04.2019 – Group-IB, an international company that specializes in preventing cyberattacks, and NGN International, a global system integrator, analyzed cybersecurity…

7 years ago

AeroGrow suffered a payment card data breach

The developer, marketer, direct-seller, and wholesaler of indoor garden systems, AeroGrow International, suffered a payment card data breach. AeroGrow International,…

7 years ago

Victims of Planetary Ransomware can decrypt their files for free

Researchers at Emsisoft developed a decryptor for the Planetary Ransomware family that could allow victims to decrypt their files for…

7 years ago

Recent Roaming Mantis campaign hit hundreds of users worldwide

Kaspersky Lab reported that hundreds of users have been targeted with malware over the past month as part of a…

7 years ago

Rockwell Automation fixes multiple DoS flaws in Stratix Switch introduced by Cisco Software

Rockwell Automation released updates for Allen-Bradley Stratix industrial switches that address several DoS flaws introduced by Cisco software. Rockwell Automation…

7 years ago

DNS hijacking campaigns target Gmail, Netflix, and PayPal users

Security experts at Bad Packets uncovered a DNS hijacking campaign that is targeting the users of popular online services, including…

7 years ago

DoS flaw in several MikroTik Routers exploited in attacks

A vulnerability could be exploited by attackers to trigger a denial-of-service (DoS) condition on devices running RouterOS. MikroTik routers made…

7 years ago

Magento Attacked Through Card Skimming Exploit

Currently of 300,000+ Magento stores, the vast majority of the installs is still running vulnerable versions of the popular content…

7 years ago

Hackers can add, remove cancer and other illnesses from Computer Tomography scans

Researchers demonstrated that hackers can modify 3D Computer Tomography scans to add or remove evidence of a serious illness, including…

7 years ago

This website uses cookies.