Security Affairs

Security Affairs newsletter Round 181 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

7 years ago

New Virobot malware combines ransomware and botnet capabilities

Security experts from Trend Micro discovered a new malware tracked as Virobot that combines ransomware and botnet capabilities. Virobot encrypts…

7 years ago

Operator of Scan4You Malware-Scanning sentenced to 14 Years in prison

The Latvian expert Ruslans Bondars (37), who developed and run the counter antivirus service Scan4You has been sentenced to 14…

7 years ago

DanaBot banking Trojan evolves and now targets European countries

Security experts at ESET have recently observed a surge in activity of DanaBot banking Trojan that is now targeting Poland, Italy, Germany,…

7 years ago

Ngrok Mining Botnet

The Ngrok campaign is unique in terms of its overall sophistication for a Docker-based attack vector. Specifically, it demonstrates a…

7 years ago

Expert disclosed an unpatched zero-day flaw in all supported versions of Microsoft Windows

A security researcher from Trend Micro Security Research team disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft…

7 years ago

Homebuyers Being Targeted by Money Transfer Scam

Money Transfer Scam - Scammers hack the victims's email accounts, monitor conversations between the buyers and title agents, send instructions…

7 years ago

Cisco fixes Remote Code Execution flaws in Webex Network Recording Player

Cisco released security patches to fix RCE flaws in the Webex Network Recording Player for Advanced Recording Format (ARF). Cisco…

7 years ago

Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange

Cybercriminals have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies from the Japanese digital currency exchange Zaif exchange. According…

7 years ago

Sustes Malware: CPU for Monero

Sustes Malware doesn't infect victims by itself, but it is spread via brute-force activities with special focus on IoT and…

7 years ago

This website uses cookies.