New BotenaGo variant specifically targets Lilin security camera DVR devices

4 years ago

Researchers spotted a new variant of the BotenaGo botnet malware that is considered highly evasive and has a zero-detection rate.…

QNAP users are recommended to disable UPnP port forwarding on routers

4 years ago

QNAP urges customers to disable Universal Plug and Play (UPnP) port forwarding on their routers to secure their NAS devices.…

ESET warns of three flaws that affect over 100 Lenovo notebook models

4 years ago

Lenovo warns of vulnerabilities in its Unified Extensible Firmware Interface (UEFI) shipped with at least 100 notebook models. Lenovo has…

Kaspersky releases a free decryptor for Yanluowang ransomware

4 years ago

Kaspersky discovered a flaw in the encryption process of the Yanluowang ransomware that allows victims to recover their files for…

NSO Group Pegasus spyware leverages new zero-click iPhone exploit in recent attacks

4 years ago

Researchers reported that threat actors leveraged a new zero-click iMessage exploit to install NSO Group Pegasus on iPhones belonging to Catalans.…

New SolarMarker variant upgrades evasion abilities to avoid detection

4 years ago

Researchers disclosed a new variant of the SolarMarker malware that implements new techniques to avoid detection. Cybersecurity researchers from Palo…

Crooks steal $182 million from Beanstalk DeFi platform

4 years ago

Credit-based stablecoin protocol Beanstalk discloses a security breach that resulted in the loss of all of its $182 million. The…

Experts spotted Industrial Spy, a new stolen data marketplace

4 years ago

A new marketplace named Industrial Spy that focuses on the sale of stolen data appeared in the threat landscape. Malware…

CISA adds VMware, Chrome flaws to its Known Exploited Vulnerabilities Catalog

4 years ago

US CISA adds a VMware privilege escalation flaw and a Google Chrome type confusion issue to its Known Exploited Vulnerabilities…

Apr 10 – Apr 16 Ukraine – Russia the silent cyber conflict

4 years ago

This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective.…

This website uses cookies.