Attackers are using fake Symantec blog website to deliver OSX.Proton malware on Mac devices.Security researchers at Malwarebytes who discovered the malware said that fake site contains an analysis of a new version of a phony malware threat called CoinThie
Researchers have discovered a new ransomware strain named Scarab which is now being distributed to millions of users via Necurs botnet.According to Forcepoint security researchers, the ongoing spam campaign was first spotted on Thanksgiving day at 07:30 U
The Saudi government’s National Cyber Security Center (NCSC) has reportedly confirmed the attack said that “The NCSC has detected a new Advanced Persistent Threat (APT) that is targeting Saudi Arabia.”
Security researchers has spotted a new file encoding ransomware variant named qkG that targets Microsoft Word’s default template upon which all new, blank Word documents are based.
Security researchers have discovered a critical flaw in the MediaProjection service in Android devices. The Android MediaProjection Flaw allows attackers to capture user’s screen and record system audio without user’s consent.All Android smartphones devic
A Security researcher has discovered three misconfigured AWS S3 buckets containing terabytes of data available for public access online.The database contains around 1.8 million social media post and forum post over past 8 years from the user across the gl
A new variant of the notorious Zeus banking trojan, Terdot discovered with espionage capabilities which allow it to control Facebook and Twitter posts, as well as the ability to eavesdrop on emails.
Oracle has issued an Oracle has issued an emergency security update for five vulnerabilities found on it various products that rely on the proprietary Jolt protocol.
A backdoor Trojan, Volgmer designed to provide covert access to a compromised system. Since 2013, HIDDEN COBRA actors observe using Volgmer malware in the wild to target the government, financial, automotive, and media industries.
Researchers have discovered several critical vulnerabilities in the Formidable Forms plugin which exposed WordPress websites to attack.Formidable plugins are used to create contact pages, polls, surveys, other forms and it have more than 200,000 active in
A Monitor Darkly, an attack on computer monitors, now wakes up the industry for further introspection.We were concerned about the Computer security for a while now. During a security review or assessments, how many of us included monitors?