Emissary Panda updated its weapons for attacks in the past 2 years

7 years ago

Experts analyzed tools and intrusion methods used by theChina-linked cyber-espionage group Emissary Panda in attacks over the past 2 years.…

Cybaze-Yoroi ZLab analyze GoBrut: A new GoLang Botnet

7 years ago

Cybaze-Yoroi ZLab analyze a new GoLang botnet named GoBrut, the investigation allowed to discover that the bot supports a lot…

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

7 years ago

Canadian media revealed that in November 2016, the International Civil Aviation Organization (ICAO) was a hit by a large-scale cyberattack.…

Analyzing the evolution of MageCart cybercrime groups’ TTPs

7 years ago

Researchers from RiskIQ and FlashPoint analyzed the evolution of Magecart groups, in particular of a gang tracked as Group 4…

CoinHive Cryptocurrency Mining Service will shut down on March 8, 2019

7 years ago

The popular in-browser cryptocurrency mining service Coinhive has announced that it will shut down on March 8, 2019. The service…

Ransomware, Trojan and Miner together against “PIK-Group”

7 years ago

Security expert Marco Ramilli analyzed a new piece of malware apparently designed to target PIK-Group that implements ransomware, Trojan, and…

Cisco WebEx Meetings affected by a new elevation of privilege flaw

7 years ago

A vulnerability in the update service of the Cisco Webex Meetings Desktop App for Windows could allow elevation of privilege…

PDF zero-day samples harvest user data when opened in Chrome

7 years ago

Experts at Exploit detection service EdgeSpot detected several PDF documents that exploit a zero-day flaw in Chrome to harvest user…

Multiple threat actors are targeting Elasticsearch Clusters

7 years ago

Security researchers at Cisco Talos are warning of a spike in attacks on unsecured Elasticsearch clusters to drop cryptocurrency miners.…

Thunderclap vulnerabilities allows to hack most of moder computers

7 years ago

Researchers found a new set of flaws that can be exploited via Thunderbolt to compromise a broad range of modern…

This website uses cookies.