Pareto Botnet, million infected Android devices conduct fraud in the CTV ad ecosystem
Researchers from Human Security have uncovered a huge botnet of Android devices being used to conduct fraud in the connected...
Researchers from Human Security have uncovered a huge botnet of Android devices being used to conduct fraud in the connected...
Cybersecurity firm Trend Micro revealed that a threat actor is actively exploiting a flaw, tracked as CVE-2020-24557, in its antivirus solutions...
During an undercover interview, a CyberNews researcher tricked ransomware operators affiliated with Ragnar Locker into revealing their ransom payout structure,...
A WhatsApp malware dubbed WhatsApp Pink is able to automatically reply to victims’ Signal, Telegram, Viber, and Skype messages. A WhatsApp...
In April 2021, the Spanish retailer Phone House allegedly suffered a ransomware attack that also exposed significant volumes of customer...
Facial recognition tech is in the news again after the FBI discovered the identify of one of the Capitol rioters...
Pulse Secure has alerted customers to the existence of an exploitable chain of attack against its Pulse Connect Secure (PCS)...
Microsoft quietly patched a local privilege escalation (LPE) flaw that affects both Windows 7 and Server 2008 R2 computers. This...
Cybercriminals with apparent ties to North Korea that hit e-commerce shops in 2019 and 2020 to steal payment card data...
The Swedish Prosecutor's Office and the Swedish State Security Service accused Russia's Main Intelligence Directorate of a hacking attack on...
The Serious Organized Crime Threat Assessment study 2021 by Europol summarises the criminal threat from the last four years and...
According to a local security firm, a Chrome exploit published online last week has been weaponized and exploited to target...
If you have read our previous blogpost “Targeted Malware Reverse Engineering Workshop follow-up. Part 1“, you probably know about the...
dnspeep lets you spy on the DNS queries your computer is making. Here's some example output: $ sudo dnspeepquery name...
Overlord provides a python-based console CLI which is used to build Red Teaming infrastructure in an automated way. The user...
The REvil ransomware operators are attempting to blackmail Apple after they has allegedly stolen product blueprints of the IT giant...
Security vendor SonicWall has addressed three zero-day vulnerabilities affecting both its on-premises and hosted Email Security products. SonicWall is warning its customers...
At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the...
The popular cyber security expert Luca Bongiorni demonstrated how to hack an X-Ray Machine using his WHIDelite tool. Recently I...
Researchers from security firm Group-IB have detected a large-scale scam campaign targeting Facebook Messenger users all over the world. Group-IB...
In 2018 three high-ranking members of a sophisticated international cybercrime group operating out of Eastern Europe were arrested and taken...
CodeCov, a company that creates software auditing tools for developers, was recently breached (the company says it was breached on...
Behind the scenes there are many people working in cyber-security that make the internet a safer place. Youssef Sammouda is...
Attackers are promoting sites that imitate the Microsoft Store, Spotify, and an online document converter to spread malware that steals...