Information Security

Threat Report Portugal: Q1 2021

The Threat Report Portugal: Q1 2021 compiles data collected on the malicious campaigns that occurred from January to March, Q1, of 2021.…

3 years ago

WeSteal, a shameless commodity cryptocurrency stealer available for sale

The bold author of a new cryptocurrency stealer, dubbed WeSteal, is promising its customers a leading way to make money…

3 years ago

Security Affairs newsletter Round 312

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

3 years ago

Hacking a Tesla Model X with a DJI Mavic 2 drone equipped with a WIFI dongle

A security duo has demonstrated how to hack a Tesla Model X’s and open the doors using a DJI Mavic…

3 years ago

Cloud hosting provider Swiss Cloud suffered a ransomware attack

Swiss cloud hosting provider Swiss Cloud has suffered a ransomware attack that seriously impacted its server infrastructure. On April 27…

3 years ago

AgeLocker ransomware operation targets QNAP NAS devices

Taiwanese vendor QNAP is warning its customers of AgeLocker ransomware attacks on their NAS devices. Crooks behind the AgeLocker ransomware…

3 years ago

Flaws in the BIND software expose DNS servers to attacks

The Internet Systems Consortium (ISC) released updates for the BIND DNS software to patch several denial-of-service (DoS) and potential RCE…

3 years ago

China-linked APT uses a new backdoor in attacks at Russian defense contractor

A China-linked cyberespionage group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy. Cybereason researchers…

3 years ago

Saving World Health Day: UNICC and Group-IB take down scam campaign impersonating the World Health Organization

UNICC and Group-IB detected and took down a massive multistage scam campaign circulating online on April 7, World Health Day. Group-IB, a…

3 years ago

Microsoft warns of BadAlloc flaws in OT, IoT devices

Microsoft researchers are warning of major security vulnerabilities affecting OT and IoT devices and high-risks for businesses using them. Researchers…

3 years ago

This website uses cookies.