Trend Micro spotted a new variant of KillDisk wiper in Latin America

8 years ago

In May, experts at Trend Micro observed a new sample of KillDisk in Latin America, the malware infected the systems…

Cisco patches a critical vulnerability in Prime Collaboration Provisioning solution

8 years ago

Cisco fixed several flaws in the Prime Collaboration Provisioning product that allows customers to manage their communications services. Cisco released…

DMOSK Malware Targeting Italian Companies

8 years ago

The security expert and malware researcher Marco Ramilli published a detailed analysis on a new strain of malware dubbed DMOSK…

Multiple models of IP-based cameras from Chinese firm Foscam could be easily hacked. Update the firmware now!

8 years ago

A security vulnerability was discovered in webcams, IP surveillance cameras and also baby monitors manufactured by the Chinese firm Foscam.…

Facebook confirms privacy settings glitch in a new feature exposed private posts of 14 Million users

8 years ago

Facebook admitted that a bug affecting its platform caused the change of the settings of some 14 million users, potentially…

Russia-linked Sofacy APT group adopts new tactics and tools in last campaign

8 years ago

Sofacy APT group (APT28, Pawn Storm, Fancy Bear, Sednit, Tsar Team, and Strontium) continues to operate and thanks to rapid and continuously changes of tactics the…

Adobe fixed the CVE-2018-5002 Flash Zero-Day exploited in targeted attacks in the Middle East

8 years ago

Adobe has recently fixed several vulnerabilities, including the CVE-2018-5002 Flash Zero-Day exploited in targeted attacks in the Middle East Adobe…

VPNFilter malware now targets new devices, even behind a firewall

8 years ago

The VPNFilter botnet now targeting new devices from other vendors, including ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE. The VPNFilter botnet…

Prowli Operation – Crooks already compromised over 40,000 servers and IoT Devices

8 years ago

Crooks have infected over 40,000 web servers, modems, and other IoT devices with the Prowli malware as part of a…

How Threat Hunters Operate in Modern Security Environments

8 years ago

Cyber security - With millions of new malware surfacing on the internet every year, threat hunters need to be ever more…

This website uses cookies.