How SOCaaS Evolves Corporate Security Infrastructure

How SOCaaS Evolves Corporate Security Infrastructure?

Last month, June 9, 2019 we featured here in Hackercombat.com an article providing a quick glimpse of what a Security Operation Center (SOC) is all about. If we can make…

Read More
Cryptojacking Apps Placed in the Microsoft App Store By Attackers

Cryptojacking Apps Placed in the Microsoft App Store By Attackers

Security researchers found a cryptomining app in the Microsoft App Store. Researchers say that it was placed in the store between April and December 2018. It’s not clear how many…

Read More
Open EDR
Average Cost of Cyberattack Exceeds 1 Million Report 2

Average Cost of Cyberattack Exceeds $1 Million: Report

The average cost of a cyberattack today exceeds $1 million, as per a recent survey report. Security firm Radware, which provides cybersecurity and application delivery solutions, has released its 2018-2019…

Read More
Cyrptocoin Minning Malware On The Rise

Cyrptocoin Minning Malware On The Rise

In the year 2018, Cryptocoin mining malware has touched 4,000 percent. Maybe, that is one of the reason that we are seeing a decline in ransomware attacks. As reported in…

Read More
FBI Recommends Rebooting Routers to Weaken a Global Malware Attack

FlawedAmmy, the Only RAT in CheckPoint’s Global Threat Index 2018 List

2017 was a year of ransomware, primarily the WannaCry malware that made $4 billion in profits from the ransom payments of its poor victims globally. This year is a bit…

Read More
The New XBash Malware with Ransomware Cryptocurrency Botnets Features

The New XBash Malware with Ransomware, Cryptocurrency, Botnets Features

A new malware, dubbed XBash piece was discovered by Security researchers at Palo Alto Networks says that it is targeting both Linux and Microsoft Windows servers. The malware Developed in Python, Xbash…

Read More
How to Protect a Company from Ransomware Attacks

Malware Uses Cryptojacking, Cryptomining With Ransomware

Ransomware has been a major headache over the recent years. Cybercriminals are currently re-looking at this malware family to concentrate on cryptomining and cryptojacking. Cryptocurrencies are still attracting criminals, regardless of the falling value, thus…

Read More
The Story Behind the Frying of an Egg on a Router

The Story Behind the Frying of an Egg on a Router

The Symantec Blackhat Conference for many years past features the awesome talent of many ethical hackers to display their wits and contribute to a safer computing world for everyone. But…

Read More
Cryptojacking is gearing up to be the next Cyberthreat

Cryptojacking Is Gearing Up To Be The Next Big Thing

Unlawful crypto mining, also known as cryptojacking, is taking the digital landscape by storm, secretly introducing itself into cryptocurrency mining programs of all kinds. The product itself, which may not even be actual malware, devours processor…

Read More
PowerGhost the PowerShell Cryptomining Malware

Here’s Why Kaspersky Says PowerGhost Is The Malware Of The Future

PowerShell is Microsoft’s new method for enabling system and network administrators to work with command lines, providing them with a more advanced scripting system where they can automate routine tasks….

Read More

Page 1 of 2

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register