Security Affairs newsletter Round 181 – News of the week

7 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

New Virobot malware combines ransomware and botnet capabilities

7 years ago

Security experts from Trend Micro discovered a new malware tracked as Virobot that combines ransomware and botnet capabilities. Virobot encrypts…

Operator of Scan4You Malware-Scanning sentenced to 14 Years in prison

7 years ago

The Latvian expert Ruslans Bondars (37), who developed and run the counter antivirus service Scan4You has been sentenced to 14…

DanaBot banking Trojan evolves and now targets European countries

7 years ago

Security experts at ESET have recently observed a surge in activity of DanaBot banking Trojan that is now targeting Poland, Italy, Germany,…

Ngrok Mining Botnet

7 years ago

The Ngrok campaign is unique in terms of its overall sophistication for a Docker-based attack vector. Specifically, it demonstrates a…

Expert disclosed an unpatched zero-day flaw in all supported versions of Microsoft Windows

7 years ago

A security researcher from Trend Micro Security Research team disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft…

Homebuyers Being Targeted by Money Transfer Scam

7 years ago

Money Transfer Scam - Scammers hack the victims's email accounts, monitor conversations between the buyers and title agents, send instructions…

Cisco fixes Remote Code Execution flaws in Webex Network Recording Player

7 years ago

Cisco released security patches to fix RCE flaws in the Webex Network Recording Player for Advanced Recording Format (ARF). Cisco…

Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange

7 years ago

Cybercriminals have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies from the Japanese digital currency exchange Zaif exchange. According…

Sustes Malware: CPU for Monero

7 years ago

Sustes Malware doesn't infect victims by itself, but it is spread via brute-force activities with special focus on IoT and…

This website uses cookies.