Linux is considered a more secure and privacy-focused operating system than Windows, not only because of a low market share (only 2% of all installed desktop operating system) but also…
Read MoreLinux is considered a more secure and privacy-focused operating system than Windows, not only because of a low market share (only 2% of all installed desktop operating system) but also…
Read MoreCybercriminals execute malware attacks using different attack vectors and using different methods. The number of malware strains is increasing in an unprecedented manner and hence malware analysis today is not…
Read MoreAn international law enforcement operation has led to the dismantling of the global cybercrime networkcybercrime network that used the GozNym banking malware to steal money from bank accounts across the…
Read MoreThis is news! A laptop containing six of the most dangerous of malware created till date is up for auction. A Samsung NC10-14GB 10.2-Inch Blue Netbook, which contains six such…
Read MoreTax Accounting Firm Wolters Kluwer, valued at $4.8 billion is currently suffering a severe malware attack that forced the company to take down their tax returns database since May 6,…
Read MoreThe development methodology of malware has changed drastically, something that cannot be ignored. A few years ago, the primary objective of the hackers was to rake profit and avoid detection….
Read MoreThe Japanese government has decided to create and maintain defensive malware in a bid to secure the country against cyberattacks. Catalin Cimpanu, security reporter at ZDNet, writes, “The Japanese Defense…
Read MoreThe Emotet malware has been frequently covered here in Hackercombat since July last year. It is not uncommon for a cyber security-centered website to discuss most if not all of…
Read MoreIn 2018 Palo Alto Networks’ Unit 42 researchers announced that they have identified a spear phishing campaign that is targeting U.S. National security think tanks and academic institutions. Research indicates…
Read MoreMalware Analysis: An Introduction Cybercriminals are becoming more sophisticated and innovative, new and advanced varieties of malware are coming up, and malware detection is becoming a real challenge. Malware analysis,…
Read More