Crooks target Android users working from home due to the Coronavirus outbreak with a Trojanized version of the popular video…
The popular Zoom app is under scrutiny, experts have discovered a vulnerability that could be exploited to steal users' Windows…
Cybersecurity researchers spotted a crypto-mining botnet, tracked as Vollgar, that has been hijacking MSSQL servers since at least 2018. Researchers…
Researchers published proof-of-concept (PoC) exploits for the CVE-2020-0796 Windows flaw, tracked as SMBGhost, that can be exploited for local privilege escalation.…
Researchers found a piece of Raccoon Stealer that abuse of Google Cloud Services and leverages multiple delivery techniques. Racoon malware…
Researchers spotted a campaign using Excel files to spread LimeRAT malware using the 8-year-old and well-known VelvetSweatshop bug. Researchers at…
A critical privilege escalation flaw in the WordPress SEO Plugin – Rank Math plugin can allow registered users to gain…
Marriott disclosed a new security breach detected at the end of February 2020 that could impact up to 5.2 million…
Holy Water - An APT group compromised a server hosting Web pages belonging mainly to religious figures and charities to…
Security expert Bob Diachenko discovered that 42 million Iranian 'Telegram' user IDs and phone numbers have been leaked online. Comparitech…
This website uses cookies.