Hacking

Hamas cyber-operatives lure Israeli soldiers to spyware hidden in tainted apps

Israeli military intelligence accused Hamas operatives of creating tainted apps to lure soldiers into downloading spyware onto their phones. According…

8 years ago

New Smoke Loader campaign aims at stealing multiple credentials from many applications

Recently experts from Talos security spotted a malware campaign leveraging Smoke Loader to steal credentials from a broad range of…

8 years ago

Thunderbird Version 52.9 addresses several issues, including the EFAIL flaw

The Thunderbird team released a new version of the popular email client that addresses many security issued, including the EFAIL…

8 years ago

Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation

Crooks leverage an alternative scheme to mine cryptocurrencies, they don't inject the CoinHive JavaScript miner directly into compromised websites. Security…

8 years ago

The GandCrab ransomware V4 appears in the threat landscape

A new variant of the infamous GandCrab ransomware V4 was released during the weekend, experts shared details of the threat,…

8 years ago

Siemens warns of several flaws affecting Central Plant Clocks

Siemens disclosed several vulnerabilities in some of its SICLOCK central plant clocks, including ones that have been rated as “critical.”…

8 years ago

Rowhammer Evolves into RAMpage Exploit, Targeting Android Phones Since 2012

This week researchers demonstrated that most Android phones released since 2012 are still vulnerable to the RAMpage attack. In 2012,…

8 years ago

Iranian Charming Kitten ATP group poses as Israeli cybersecurity firm in phishing campaign

Iranian APT groups continue to very active, recently Charming Kitten cyber spies attempted to pose as an Israeli cyber-security firm that…

8 years ago

Microsoft revealed that 2 Zero-Days found in March were part of a cyber weapon in an early development stage

Microsoft published technical details of 2 zero-days that have been recently discovered after someone uploaded a weaponized PDF file to…

8 years ago

Trezor users targeted by phishing attacks, experts blame DNS Poisoning or BGP Hijacking

The maintainers of the Trezor multi-cryptocurrency wallet service reported a phishing attack against some of its users that occurred during…

8 years ago

This website uses cookies.