Experts at Cylance disclosed two UEFI flaws that can be exploited by attackers to install a backdoor on some Gigabyte…
Experts at Kaspersky presented the findings of its research that definitively connect the Moonlight Maze cyber espionage campaigns to the…
A series of phishing campaigns is targeting airline consumers with messages crafted to trick victims into handing over personal or…
Malware researchers at Forcepoint have discovered a new modular malicious code, dubbed Felismus RAT, that appears the work of skilled…
The source code for a new banking Trojan dubbed Nuclear Bot was leaked online, experts speculate a rapid diffusion of…
Security researchers at Palo Alto Networks have determined that the Shamoon 2 malware uses a rudimentary technique for network distribution.…
Trend Micro discovered the Chinese threat actor Winnti has been abusing GitHub service for command and control (C&C) communications. Security…
Findings of the MIMICS project conducted by Dragos Threat Operations Center show a malware posing as Siemens PLC application is…
Security researchers at MalwareBytes have uncovered a spearphishing campaign that targeted Saudi Arabia Government organizations. Security experts at MalwareBytes have…
Malware researchers at Fortinet have discovered a weaponized Word document that is able to start the infection process on both…
This website uses cookies.