Ransomware operators are exploiting two VMWare ESXi vulnerabilities, CVE-2019-5544 and CVE-2020-3992, to encrypt virtual hard disks. Security experts are warning…
Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target…
The Rocke group is using a new piece of cryptojacking malware dubbed Pro-Ocean to target Apache ActiveMQ, Oracle WebLogic, and…
FonixCrypter ransomware operators shut down their operations, released the master decryption key for free, and deleted malware's source code. Good…
Microsoft, like Google TAG, observed a cyber espionage campaign aimed at vulnerability researchers that attributed to North Korea-linked Zinc APT…
Researchers at the Italian CERT warns of new Android malware dubbed Oscorp that abuses accessibility services for malicious purposes. Researchers…
The TeamTNT cybercrime group has improved its Linux cryptocurrency miner by implementing open-source detection evasion capabilities. The TeamTNT cybercrime group…
A joint operation of U.S. and EU law enforcement authorities allowed the seizure of the leak sites used by NetWalker…
A global operation of law enforcement has dismantled the infrastructure of the infamous Emotet botnet. A global operation of law…
Google TAG is warning that North Korea-linked hackers targeting security researchers through social media. Google Threat Analysis Group (TAG) is…
This website uses cookies.