Security Affairs

Multi-platform Tycoon Ransomware employed in targeted attacks

Experts recently discovered a multi-platform ransomware, dubbed Tycoon Ransomware, that uses a Java image file (JIMAGE) to evade detection. Experts…

6 years ago

Cyber Defense Magazine – June 2020 has arrived. Enjoy it!

Cyber Defense Magazine June 2020 Edition has arrived. We hope you enjoy this month's edition…packed with over 165 pages of…

6 years ago

Google reveals that foreign hackers are already targeting Trump and Biden campaigns

Google researchers revealed that campaign staffs for both President Donald Trump and Joe Biden have been targeted recently by foreign…

6 years ago

Cycldek APT targets Air-Gapped systems using the USBCulprit Tool

A Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from…

6 years ago

North Atlantic Council is warning of malicious cyber activities during COVID-19 pandemic

North Atlantic Council issued a statement warning of concerning malicious cyber activities against entities involved in the fight against COVID-19.…

6 years ago

Large-scale campaign targets configuration files from WordPress sites

Security experts have observed a large-scale campaign over the weekend aimed at stealing configuration files from WordPress sites. Security researchers…

6 years ago

Hackers hijacked Coincheck ‘s domain registrar account and targeted some users

Hackers hijacked one of the domains of the Japanese cryptocurrency exchange Coincheck and used it for spear-phishing attacks. The Japanese…

6 years ago

Sodinokibi ransomware gang launches auction site to sell stolen data

REvil /Sodinokibi ransomware operators launch an auction site to sell data stolen from victims that have chosen to not pay…

6 years ago

Russia-linked APT exploited at least 3 Exim flaws in recent attacks

Several flaws in the Exim mail transfer agent (MTA) have been exploited by Russia-linked hackers, hundreds of thousands of servers…

6 years ago

IP-in-IP flaw affects devices from Cisco and other vendors

A flaw in the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls impact…

6 years ago

This website uses cookies.