GandCrab ransomware evolves thanks to an AGILE development process

8 years ago

According to Check Point report, the authors of the prolific GandCrab ransomware are continuously improving their malware by adopting the…

Mossack Fonseca law firm shuts down operations 2 years after Panama Papers

8 years ago

News of the day is that the Mossack Fonseca law firm would shut down operations due to the reputational damage caused…

Hacking SAP CRM by chaining 2 vulnerabilities in SAP NetWeaver AS Java

8 years ago

Security experts at ERPScan explained that chaining 2 flaws recently patched it is possible to hack SAP CRM systems and…

The RottenSys botnet is already composed of nearly 5 million Android devices

8 years ago

RottenSys - A Chinese crime ring is building a huge botnet that is already composed of nearly 5 million Android…

VPN leaks affect 3 Major VPN vendors, only Hotspot Shield promptly fixed it

8 years ago

The website VPNMentor discovered that IP leak issues in three major VPN vendors, only Hotspot Shield VPN promptly fixed it. The…

Qrypter RAT hits 243 organizations worldwide in February

8 years ago

Qrypter RAT hits 243 organizations worldwide in February 2018, its popularity in the cybercrime ecosystem continues to increase. A new…

Experts discovered a new tiny Pos Malware dubbed Pinkkite

8 years ago

Researchers presented findings on a new strain of point-of-sale malware, dubbed PinkKite, that was spotted by security experts at Kroll Cyber…

What’s new in Microsoft Patch Tuesday updates for March 2018?

8 years ago

Microsoft Patch Tuesday updates for March 2018 - Microsoft released security updates for 75 security flaws, 14 of them listed…

OceanLotus APT is very active, it used new Backdoor in recent campaigns

8 years ago

The OceanLotus APT group, also known as APT32 and APT-C-00, has been using a new backdoor in recently observed attacks.…

March 2018 SAP Security Patch Day addresses decade-old vulnerabilities

8 years ago

SAP released March 2018 SAP Security Patch Day that addresses High and Medium priority vulnerabilities in its products, including three…

This website uses cookies.