Security experts uncovered a new cryptojacking campaign tracked as Beapy that leverages the NSA's DoublePulsar backdoor and the EternalBlue exploit.…
Experts at Proofpoint discovered that free code repositories on GitHub have been abused since at least 2017 to host phishing…
Experts uncovered hacking campaigns exploiting two critical security vulnerabilities in the popular WordPress plugin Social Warfare. Social Warfare is a…
A serious flaw in some of Rockwell Automation’s MicroLogix and CompactLogix PLCs can be exploited by a remote attacker to…
Security experts are warning of a dangerous zero-day remote code vulnerability that affects the Oracle WebLogic service platform. Oracle WebLogic wls9_async and wls-wsat…
Security researchers at Yoroi-Cybaze ZLab uncovered a new campaign carried out by the Russian state-actor dubbed Gamaredon. Introduction Few days…
Iran-linked OilRig cyberespionage group is using the reconnaissance malware Karkoff along with DNSpionage in recent campaigns.Iran-linked OilRig cyberespione group is…
Experts at Kaspersky Lab linked the recent supply-chain attack targeted ASUS users to the "ShadowPad" threat actor and the CCleaner…
Bad news for fitness and bodybuilding passionates, the popular online retailer Bodybuilding.com announced that hackers have broken into its systems.…
Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none…
This website uses cookies.