A free Decryptor tool for GandCrab Ransomware released

7 years ago

Good news for the victims of the latest variants of the GandCrab ransomware, NoMoreRansomware released a free decryption tool. Victims…

NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

7 years ago

According to The New York Times, the United States planted destructive malware in Russia’s electric power grid. The New York…

New phishing campaign targets bank customers with WSH RAT

7 years ago

Security researchers at Cofense have spotted a phishing campaign aimed at commercial banking customers distributing a new remote access trojan…

From Targeted Attack to Untargeted Attack

7 years ago

Today I’d like to share an interesting and heavily obfuscated Malware which made me thinking about the meaning of 'Targeted…

Hacker is targeting DNA sequencer applications from Iranian IP address

7 years ago

Threat actors are targeting Web-based DNA sequencer applications leveraging a still-unpatched zero-day to take over the targeted systems. Starting from…

Bella Thorne published her private nude photos before a hacker that was threatening her

7 years ago

Bella Thorne is the last victim of a sextortion attack, in a case similar to the Fappening saga, a hacker…

New Echobot Botnet targets Oracle, VMware Apps and includes 26 Exploits

7 years ago

Operators behind the Echobot botnet added new exploits to infect IoT devices, and also enterprise apps Oracle WebLogic and VMware…

Linux worm spreading via Exim servers hit Azure customers

7 years ago

On Friday, security experts at Microsoft warned of a new Linux worm, spreading via Exim email servers, that already compromised…

Security Affairs newsletter Round 218 – News of the week

7 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Kindle Edition…

XSS flaw would have allowed hackers access to Google’s network and impersonate its employees

7 years ago

Bug hunter Thomas Orlita discovered an XSS vulnerability in Google's Invoice Submission Portal that would have allowed attackers access to…

This website uses cookies.