An APT group is exploiting the flaws patched earlier this year in Firefox and Internet Explorer in attacks aimed at…
A recently discovered strain of malware exploits the current COVID19 pandemic to render computers unusable by overwriting the MBR. SonicWall’s…
Crooks target Android users working from home due to the Coronavirus outbreak with a Trojanized version of the popular video…
Microsoft is sending notifications to dozens of hospitals about vulnerable VPN devices and gateways exposed online in their network. Microsoft…
The popular Zoom app is under scrutiny, experts have discovered a vulnerability that could be exploited to steal users' Windows…
Cybersecurity researchers spotted a crypto-mining botnet, tracked as Vollgar, that has been hijacking MSSQL servers since at least 2018. Researchers…
Researchers published proof-of-concept (PoC) exploits for the CVE-2020-0796 Windows flaw, tracked as SMBGhost, that can be exploited for local privilege escalation.…
Researchers found a piece of Raccoon Stealer that abuse of Google Cloud Services and leverages multiple delivery techniques. Racoon malware…
Researchers spotted a campaign using Excel files to spread LimeRAT malware using the 8-year-old and well-known VelvetSweatshop bug. Researchers at…
A critical privilege escalation flaw in the WordPress SEO Plugin – Rank Math plugin can allow registered users to gain…
This website uses cookies.