LATEST ARTICLES

Spotted Malware Researchers Written in Nim Programming Language

Cybersecurity researchers have unwrapped an "interesting email campaign" conducted by a threat actor that has taken to distributing new malicious software written in the Nim programming language. Called the "NimzaLoader" by Proofpoint...

New Bugs Could Let Hackers Avoid Mitigating Attack on Linux Systems

Cybersecurity researchers revealed on Monday two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could allow attackers to bypass mitigation for speculative attacks like Specter and gain sensitive information...

Various Mirai Variation and New ZHtrap Botnet Malware in the Wild

Cybersecurity researchers on Monday unveiled a new wave of persistent attacks exploiting multiple vulnerabilities to deploy new Mirai variants on internet-connected devices. "After being successfully exploited, the attackers attempt to download a...

Hackers Infect Apple App Developers With Trojanized Xcode Projects

Cybersecurity investigators on Thursday unveiled a new attack in which threat actors leverage Xcode as an attack vector to compromise Apple's back-end platform developers, adding to a growing trend that includes...

Patient Died After Ransomware Attack Paralyzes German Hospital Systems

German authorities revealed last week that a ransomware attack on the University Hospital of Düsseldorf (UKD) caused a failure in IT systems, resulting in the death of a woman who had...

The Tesla Ransomware Hacker Pleads Guilty; Accused Swiss Hacker of Fraud

Yesterday the US Justice Department announced updates on two separate cyber-hacking cases - a Swiss hacker and a Russian hacker who planned to plant malicious software with Tesla. A Swiss hacker involved...

ZeroLogon Critical Windows Server vulnerability detection and prevention

If you're administering Windows Server, make sure it's up to date with all the recent patches announced by Microsoft, especially the one that patches a recently patched critical vulnerability that could...

WARNING: Android’s No Day New Vulnerability Is Under Active Attack

Google has revealed that opponents are patching a now patched vulnerability affecting Android devices that use Qualcomm chips to launch targeted attacks. Traced as CVE-2020-11261 (CVSS Score 8.4), the flaw relates to...

Purple Rootkit Fox Fox can now Spread Itself into Other Windows Computers

Purple Fox, malicious Windows software that used to be known for infectious machines using exploitation kits and phishing emails, has now added a new technique to its arsenal that gives it...

Fingerprint Tracking Developers Researchers Helping several Malware Authors

Writing advanced malicious software for a threat actor requires different groups of people with diverse technical expertise to put them all together. But can the code leave enough clues to reveal...