Trending Now
MOST POPULAR
Spotted Malware Researchers Written in Nim Programming Language
Cybersecurity researchers have unwrapped an "interesting email campaign" conducted by a threat actor that has taken to distributing new malicious software written in the...
CYBER ATTACK
Increased demand for DDoS protection software market by 2020-2028
A Distributed Denial of Service (DDoS) attack is a type of malicious attack that disrupts normal network traffic by overloading the website with more...
Tesla Ransomware hacker Pleads Guilty; Hactivist from Switzerland accused of fraud
the US Justice Department announced updates on two separate cases of cyberattacks: a Swiss hacker and a Russian hacker planning to plant malicious software...
LATEST DATA
US agencies and FireEye were hacked using SolarWinds Backdoor software
State-sponsored actors allegedly working for Russia targeted the U.S. Treasury, the Department of Commerce's National Telecommunications and Information Administration (NTIA), and other government agencies...

SENSITIVITY
Patient Died After Ransomware Attack Paralyzes German Hospital Systems
German authorities revealed last week that a ransomware attack on the University Hospital of Düsseldorf (UKD) caused a failure in IT systems, resulting in the death of a woman who had...
ZeroLogon Critical Windows Server vulnerability detection and prevention
If you're administering Windows Server, make sure it's up to date with all the recent patches announced by Microsoft, especially the one that patches a recently patched critical vulnerability that could...
Fingerprint Tracking Developers Researchers Helping several Malware Authors
Writing advanced malicious software for a threat actor requires different groups of people with diverse technical expertise to put them all together. But can the code leave enough clues to reveal...
EDITOR'S PICK
LATEST ARTICLES
Spotted Malware Researchers Written in Nim Programming Language
Cybersecurity researchers have unwrapped an "interesting email campaign" conducted by a threat actor that has taken to distributing new malicious software written in the Nim programming language.
Called the "NimzaLoader" by Proofpoint...
New Bugs Could Let Hackers Avoid Mitigating Attack on Linux Systems
Cybersecurity researchers revealed on Monday two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could allow attackers to bypass mitigation for speculative attacks like Specter and gain sensitive information...
Various Mirai Variation and New ZHtrap Botnet Malware in the Wild
Cybersecurity researchers on Monday unveiled a new wave of persistent attacks exploiting multiple vulnerabilities to deploy new Mirai variants on internet-connected devices.
"After being successfully exploited, the attackers attempt to download a...
Hackers Infect Apple App Developers With Trojanized Xcode Projects
Cybersecurity investigators on Thursday unveiled a new attack in which threat actors leverage Xcode as an attack vector to compromise Apple's back-end platform developers, adding to a growing trend that includes...
Patient Died After Ransomware Attack Paralyzes German Hospital Systems
German authorities revealed last week that a ransomware attack on the University Hospital of Düsseldorf (UKD) caused a failure in IT systems, resulting in the death of a woman who had...
The Tesla Ransomware Hacker Pleads Guilty; Accused Swiss Hacker of Fraud
Yesterday the US Justice Department announced updates on two separate cyber-hacking cases - a Swiss hacker and a Russian hacker who planned to plant malicious software with Tesla.
A Swiss hacker involved...
ZeroLogon Critical Windows Server vulnerability detection and prevention
If you're administering Windows Server, make sure it's up to date with all the recent patches announced by Microsoft, especially the one that patches a recently patched critical vulnerability that could...
WARNING: Android’s No Day New Vulnerability Is Under Active Attack
Google has revealed that opponents are patching a now patched vulnerability affecting Android devices that use Qualcomm chips to launch targeted attacks.
Traced as CVE-2020-11261 (CVSS Score 8.4), the flaw relates to...
Purple Rootkit Fox Fox can now Spread Itself into Other Windows Computers
Purple Fox, malicious Windows software that used to be known for infectious machines using exploitation kits and phishing emails, has now added a new technique to its arsenal that gives it...
Fingerprint Tracking Developers Researchers Helping several Malware Authors
Writing advanced malicious software for a threat actor requires different groups of people with diverse technical expertise to put them all together. But can the code leave enough clues to reveal...