New Shodan Monitor service allows tracking Internet-Exposed devices

7 years ago

Shodan IoT search engine announced the launch of a new service called Shodan Monitor designed to help organizations to maintain…

WinRAR CVE-2018-20250 flaw exploited in multiple campaigns

7 years ago

The recently patched vulnerability affecting the popular archiver utility WinRAR has been exploited to deliver new malware to targeted users.…

Gustuff Android banking trojan targets 125+ banking, and 32 cryptocurrency apps

7 years ago

Security experts at Group-IB have detected the activity of Gustuff a mobile Android Trojan, which includes potential targets of customers…

Lazarus APT continues to target cryptocurrency businesses with Mac malware

7 years ago

North Korea-linked Lazarus group made the headlines again, it has been leveraging PowerShell to target both Windows and macOS machines.…

ASUS fixes supply chain of Live Update tool hit in Operation ShadowHammer

7 years ago

ASUS released security patches to fix the issues in the Live Update utility that were exploited by threat actors in…

Operation SaboTor – Police arrested 61 vendors and buyers in the dark web

7 years ago

Operation SaboTor - A coordinated operation conducted by law enforcement agencies from Europe, Canada, and the United States targeted vendors…

LUCKY ELEPHANT campaign targets South Asian governments

7 years ago

The NETSCOUT Threat Intelligence team uncovered a credential harvesting campaign tracked as LUCKY ELEPHANT targeting mostly South Asian governments. Security…

Norsk Hydro estimates losses between $35M – $41M in the first week after cyberattack

7 years ago

Norwegian aluminum giant Norsk Hydro estimates more than $40 million losses in the first week following the ransomware attack that disrupted…

A new AZORult C++ variant can establish RDP connections

7 years ago

Experts from Kaspersky observed a new C++ version of the AZORult data stealer that implements the ability to establish RDP…

Experts found 36 vulnerabilities in the LTE protocol

7 years ago

A team of researchers from the Korea Advanced Institute of Science and Technology Constitution (KAIST) discovered 36 vulnerabilities in the…

This website uses cookies.