it security news

Multi-platform Tycoon Ransomware employed in targeted attacksMulti-platform Tycoon Ransomware employed in targeted attacks

Multi-platform Tycoon Ransomware employed in targeted attacks

Experts recently discovered a multi-platform ransomware, dubbed Tycoon Ransomware, that uses a Java image file (JIMAGE) to evade detection. Experts…

5 years ago
Cyber Defense Magazine – June 2020 has arrived. Enjoy it!Cyber Defense Magazine – June 2020 has arrived. Enjoy it!

Cyber Defense Magazine – June 2020 has arrived. Enjoy it!

Cyber Defense Magazine June 2020 Edition has arrived. We hope you enjoy this month's edition…packed with over 165 pages of…

5 years ago
Google reveals that foreign hackers are already targeting Trump and Biden campaignsGoogle reveals that foreign hackers are already targeting Trump and Biden campaigns

Google reveals that foreign hackers are already targeting Trump and Biden campaigns

Google researchers revealed that campaign staffs for both President Donald Trump and Joe Biden have been targeted recently by foreign…

5 years ago
Cycldek APT targets Air-Gapped systems using the USBCulprit ToolCycldek APT targets Air-Gapped systems using the USBCulprit Tool

Cycldek APT targets Air-Gapped systems using the USBCulprit Tool

A Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from…

5 years ago
North Atlantic Council is warning of malicious cyber activities during COVID-19 pandemicNorth Atlantic Council is warning of malicious cyber activities during COVID-19 pandemic

North Atlantic Council is warning of malicious cyber activities during COVID-19 pandemic

North Atlantic Council issued a statement warning of concerning malicious cyber activities against entities involved in the fight against COVID-19.…

5 years ago
Two issues in Zoom could have allowed code executionTwo issues in Zoom could have allowed code execution

Two issues in Zoom could have allowed code execution

Researchers from Cisco Talos disclosed two critical flaws in the Zoom software that could have allowed attackers to hack into the systems…

5 years ago
Tor Browser 9.5 is available for download, with new interesting featuresTor Browser 9.5 is available for download, with new interesting features

Tor Browser 9.5 is available for download, with new interesting features

Tor Browser 9.5 includes important security updates to Firefox, users on desktop will be able to opt-in for using onion sites automatically…

5 years ago
Russia-linked APT exploited at least 3 Exim flaws in recent attacksRussia-linked APT exploited at least 3 Exim flaws in recent attacks

Russia-linked APT exploited at least 3 Exim flaws in recent attacks

Several flaws in the Exim mail transfer agent (MTA) have been exploited by Russia-linked hackers, hundreds of thousands of servers…

5 years ago
IP-in-IP flaw affects devices from Cisco and other vendorsIP-in-IP flaw affects devices from Cisco and other vendors

IP-in-IP flaw affects devices from Cisco and other vendors

A flaw in the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls impact…

5 years ago
There was no data breach in the cyberattack against Minneapolis PoliceThere was no data breach in the cyberattack against Minneapolis Police

There was no data breach in the cyberattack against Minneapolis Police

Last week a massive distributed denial-of-service (DDoS) attack shut down the websites and systems of Minneapolis, but there is no…

5 years ago