Hacking

Stealth CrossRAT malware targets Windows, MacOS, and Linux systems

The popular former NSA hacker Patrick Wardle published a detailed analysis of the CrossRAT malware used by Dark Caracal for surveillance.…

8 years ago

Maersk chair revealed its company reinstalled 45,000 PCs and 4,000 Servers after NotPetya Attack

The shipping giant Maersk chair Jim Hagemann Snabe revealed its company reinstalled 45,000 PCs and 4,000 Servers after NotPetya the attack.…

8 years ago

A look into the cyber arsenal used by Lazarus APT hackers in recent attacks against financial institutions

Security experts at Trend Micro have analyzed malware and a tool used by the Lazarus APT group in the recent…

8 years ago

Spritecoin ransomware masquerades as cryptocurrency wallet and also harvests victim’s data

Fortinet discovered a strain of ransomware dubbed Spritecoin ransomware that only allows victims Monero payments and pretends to be a cryptocurrency-related…

8 years ago

libcurl has had authentication leak bug dated back to before September 1999

According to a security advisory, libcurl is affected by a couple of issues, one of them might cause the leakage of authentication data…

8 years ago

Critical code execution flaw in Electron framework impacts popular Desktop apps such as Skype and Signal

A critical RCE vulnerability in the Electron framework impacts popular desktop applications, including Skype, Signal, Slack, GitHub Desktop, Twitch, and…

8 years ago

Are you a Tinder user? Watch out, someone could spy on you

Experts at security firm Checkmarx discovered two security vulnerabilities in the Tinder mobile apps that could be exploited to spy…

8 years ago

According to TrendMicro Business Email Compromise (BEC) attacks could reach $ 9 billion in 2018

According to a report published by the security firm TrendMicro, Business Email Compromise (BEC) attacks could reach $ 9 billion…

8 years ago

Intel recommended to stop deploying the current versions of Spectre/Meltdown patches

Intel recommended OEMs, cloud service providers, system manufacturers, software vendors as well as end users to stop deploying the current…

8 years ago

WordPress plugins and themes vulnerabilities statistics for 2017

WordPress plugins and themes vulnerabilities statistics for 2017. The statistics were derived from our up-to-date WordPress Vulnerabilities Database. We are monitoring a…

8 years ago

This website uses cookies.