Experts spotted a new variant of UpdateAgent macOS malware dropper written in Swift

4 years ago

Researchers spotted a new variant of the UpdateAgent macOS malware dropper that was employed in attacks in the wild. Researchers…

Venezuelan cardiologist accused of operating and selling Thanos ransomware

4 years ago

The U.S. Justice Department accused a 55-year-old Venezuelan cardiologist of operating and selling the Thanos ransomware. The U.S. Justice Department accused…

Over 200 Apps on Play Store were distributing Facestealer info-stealer

4 years ago

Experts spotted over 200 Android apps on the Play Store distributing spyware called Facestealer used to steal sensitive data. Trend Micro researchers…

CISA adds CVE-2022-30525 flaw in Zyxel Firewalls to its Known Exploited Vulnerabilities Catalog

4 years ago

US Critical Infrastructure Security Agency (CISA) adds critical CVE-2022-30525 RCE flaw in Zyxel Firewalls to its Known Exploited Vulnerabilities Catalog.…

A custom PowerShell RAT uses to target German users using Ukraine crisis as bait

4 years ago

Researchers spotted a threat actor using a custom PowerShell RAT targeting German users to gain intelligence on the Ukraine crisis.…

Apple fixes the sixth zero-day since the beginning of 2022

4 years ago

Apple released security updates to address a zero-day bug actively exploited in attacks against Macs and Apple Watch devices. Apple…

Experts show how to run malware on chips of a turned-off iPhone

4 years ago

Researchers devised an attack technique to tamper the firmware and execute a malware onto a Bluetooth chip when an iPhone…

Ukrainian national sentenced to 4 years in prison for selling access to hacked servers

4 years ago

A 28-year-old Ukrainian national has been sentenced to four years in prison for selling access to hacked servers. Glib Oleksandr…

Eternity Project: You can pay $260 for a stealer and $490 for a ransomware

4 years ago

Researchers from threat intelligence firm Cyble analyzed the Eternity Project Tor website which offers any kind of malicious code. Researchers…

May 08 – May 14 Ukraine – Russia the silent cyber conflict

4 years ago

This post provides a timeline of the events related to Russia invasion of Ukraine from the cyber security perspective. Below…

This website uses cookies.