FBI warns of spike in phishing campaigns to gather W-2 information

8 years ago

The FBI is warning of a spike in phishing campaigns aimed to steal W-2 information from payroll personnel during the IRS’s tax…

Iran-linked group OilRig used a new Trojan called OopsIE in recent attacks

8 years ago

According to malware researchers at Palo alto Networks, the Iran-linked OilRig APT group is now using a new Trojan called OopsIE. The…

Chaos backdoor, a malicious code that returns from the past targets Linux servers

8 years ago

Security experts from GoSecure, hackers are launching SSH brute-force attacks on poorly secured Linux servers to deploy a backdoor dubbed Chaos backdoor.…

OMG botnet, the first Mirai variant that sets up proxy servers on vulnerable devices

8 years ago

Researchers at Fortinet have discovered the OMG botnet, the first Mirai variant that sets up proxy servers on the compromised…

Cybersecurity – Tips to Protect Small Business from Cyber Attacks

8 years ago

Small Business is a privileged target of attackers, in fact, there is a high risk of having problems with hackers…

Meltdown patch for OpenBSD is available … let’s wait for feedbacks

8 years ago

OpenBSD releases Version 11 code update that addresses the Meltdown vulnerability by implementing the separation between the kernel and the user…

Drupal addressed several vulnerabilities in Drupal 8 and 7

8 years ago

The Drupal development team addressed many vulnerabilities in both Drupal 8 and 7, including some flaws rated as "critical". Drupal maintainers have…

Hackers compromised a Tesla Internal Servers with a Cryptocurrency miner

8 years ago

Cloud security firm RedLock discovered that hackers have compromised the Tesla cloud computing platform to mine cryptocurrency. Tesla has confirmed…

The Global cost of cybercrime jumped up to $600 Billion

8 years ago

The tech giants McAfee and Cisco published to reports that providers further info about the global impact of cybercrime. Which is the cost…

Google white hackers disclosed critical vulnerabilities in uTorrent clients

8 years ago

White hackers at Google Project Zero have discovered two critical remote code execution vulnerabilities in versions of BitTorrent’s web-based uTorrent…

This website uses cookies.