A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features. A recently discovered strain of ransomwar ...
A security expert revealed a number of flaws in the big player’s two-factor authentication methods that could allow crooks to steal money. Social media bug bounty hunter, Arne Swinnen, has revealed ...
Security experts from Damballa that analyzed the SFG malware confirmed that it was not designed to target SCADA systems in the energy industry Recently, experts from the SentinelOne security firm spo ...
Colleagues at HackRead discovered a seller using the pseudonym of 'DataDirect' offering US voters' registration records on a black marketplace. On the Dark Web is quite easy to find any kind of data, ...