Hackers are now increasingly exploiting cryptojacking malware without needing active browsers

Hackers Now Launch Cryptomining Campaigns That Operate Without Active Browsers

Hackers are now increasingly exploiting cryptojacking malware without needing active browsers, as per a recent report. Cyber security firm Check Point, in its latest Global Threat Index, states how hackers…

Read More
Malware Slingshot 1

Researchers Discover Stealthy Malware That Extends Within Routers

Kaspersky Lab researchers have reported the discovery of a highly sophisticated cyber-espionage campaign which has been named Slingshot and which spreads through compromised routers, at the same time remaining undetected…

Read More
Open EDR
Different Kinds of Malware

A Brief History And The Different Kinds Of Malware

Malware: An Introduction Malware or malicious software could be defined as the software that cyber criminals develop with malicious intents- like accessing and causing damage to a computer/mobile device or…

Read More
First Kotlin Based Malware

Security Discovery: 1st Kotlin-Based Malware In Google Play Store

Cyber security researchers have reportedly discovered what they think is the first Krotin-based malware affecting the Android OS. The discovery has been made by researchers at Trend Micro; a Trend…

Read More
Zyklon Malware

Zyklon Malware Campaign Targets Microsoft Office Users

Zyklon, a new malware is out and targeting Microsoft Office users through their inboxes. This dangerous malware is making use of human negligence plus software that’s out of date. Experts…

Read More
complex pzchao windows malware monitored experts

Complex PZChao Windows Malware Being Monitored by Experts

PZChao, a new and complex Windows malware, is being monitored by cyber security experts since last July. It’s security researchers at cyber security firm Bitdefender who have been monitoring this…

Read More
threat mobile device called dark caracal malware

Threat to Mobile Device called Dark Caracal Malware

How many of us know that the devices that we use for our daily use are prone to theft, hack, and other software-related issues. Electronic Frontier Foundation’s researchers uncovered a…

Read More
DNS Hijacking Malware

DNS-Hijacking Malware Bypasses Antivirus and Infects Apple MacOS

Here’s a bit of a bad news for Mac users; there are reports about fresh malware that has successfully bypassed antivirus software and infected Mac OS. This malware, it’s reported,…

Read More
malware

Criminals now spoof scanners and printers to spread malware

Cyber criminals are getting smarter and more resourceful. They are now spoofing hardware accessories to spread their malicious payloads. Recent reports have revealed that some hackers have begun sending malicious…

Read More
North korean Hackers

NoKor Hackers Behind Latest Round Of Spearphishiing

A recently published report indicates that a North Korean hacking group has launched a widespread malicious spearphishing campaign. It’s the US cybersecurity firm Secureworks that has published the report; the…

Read More

Page 19 of 25

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register