hacking news

Alleged Iranian threat actors leak the code of their CodeRAT malware

The author of the remote access trojan (RAT) CodeRAT has leaked the source code of its malware on GitHub. The…

3 years ago

Google rolled out emergency fixes to address actively exploited Chrome zero-day

Google rolled out emergency fixes to address a vulnerability in the Chrome web browser that is being actively exploited in…

3 years ago

Samsung discloses a second data breach this year

Electronics giant Samsung has confirmed a new data breach after some of its US systems were compromised in July. After…

3 years ago

Another Ransomware For Linux Likely In Development

Uptycs researchers recently spotted a new Linux ransomware that appears to be under active development. The Uptycs Threat Research team…

3 years ago

Experts link Raspberry Robin Malware to Evil Corp cybercrime gang

Researchers attribute the Raspberry Robin malware to the Russian cybercrime group known as Evil Corp group. IBM Security X-Force researchers…

3 years ago

Google Chrome issue allows overwriting the clipboard content

A security issue in the Google Chrome browser could allow malicious web pages to automatically overwrite clipboard content. A vulnerability…

3 years ago

Attack infrastructure used in Cisco hack linked to Evil Corp affiliate

Researchers discovered that the infrastructure used in Cisco hack was the same used to target a Workforce Management Solution firm.…

3 years ago

Researchers analyzed a new JavaScript skimmer used by Magecart threat actors

Researchers from Cyble analyzed a new, highly evasive JavaScript skimmer used by Magecart threat actors. Cyble Research & Intelligence Labs…

3 years ago

Ragnar Locker ransomware gang claims to have stolen data from TAP Air Portugal

The Ragnar Locker ransomware gang claims to have hacked the Portuguese state-owned flag carrier airline TAP Air Portugal and stolen…

3 years ago

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Researchers discovered 1,859 Android and iOS apps containing hard-coded Amazon Web Services (AWS) credentials. Researchers from Broadcom Symantec's Threat Hunter…

3 years ago

This website uses cookies.