Windows 10 1903 Upgrade A Repeat Of 1809 Nightmare

Windows 10 1903 Upgrade: A Repeat Of 1809 Nightmare?

Microsoft lost a lot of user confidence when the company released the half-baked Windows 10 1809 upgrade October last year, which unexpectedly deleted files of users without any warning during…

Read More
Huddle House Restaurant Chain’s POS System Breached

Huddle House Restaurant Chain’s POS System Breached

A security breach has impacted the POS (Point of Sale) system at Huddle House, the U.S-based casual dining and fast food restaurant chain. An official breach announcement dated February 1,…

Read More
Open EDR
Did Apple Really Ban Facebook and Google’s Apps

Did Apple Really Ban Facebook and Google’s Apps? Why?

As reported in TechCrunch Google and Facebook have been violating Apple’s policies, using apps that tracked user behavior outside Apple’s App Store. Apple temporarily banned Facebook and Google from running…

Read More
Cryptojacking Malware Hits 8 Australian Webhosting Companies

Cryptojacking Malware Hits 8 Australian Webhosting Companies

Monero mining malware is in full swing now, as eight Australian companies reported that they were compromised with malware. The cybercriminals were able to monetize their Monero mining malware to…

Read More
APT39 Iranian Cyber Espionage Team Active In The Wild Again

APT39 Iranian Cyber Espionage Team, Active In The Wild Again

The infamous APT39, the alleged Iran-funded cyber espionage team has been identified by FireEye as actively targeting Europe, USA, Australia, South Korea and the Middle East region for their espionage…

Read More
Cyberwarfare Up Close United States Forces Vs North Korean Joanap Botnet

Cyberwarfare Up-Close: United States Forces Vs North Korean Joanap Botnet

A team composed of members coming from U.S. Airforce, DOJ and FBI are assembled in order to track down and stop the operation of the alleged North Korean-funded botnet named…

Read More
The FBI Warns Banks About The Rise Of “ATM Cash Out” Attacks

How to Ensure Protection Against ATM Jackpotting

Of late, cybercriminals have been showing an increasing trend to target ATMs, all across the world. They employ different methods to target ATMs, most of which are potentially good targets…

Read More
Malware Attack Using Google Cloud Computing Platform

Malware Attack Using Google Cloud Computing Platform

Hackers have unleashed a global malware campaign using the Google cloud computing platform via weaponized PDF. Security researchers at the Netskope Threat Research Labs have detected this malware attack, which…

Read More
Redaman Banking Trojan of 2015 Resurrects Targets Russian Email Users

Redaman Banking Trojan of 2015 Resurrects, Targets Russian Email Users

A 2015-era banking trojan is seen actively spreading in the wild again, this time specifically targeting potential victims from a specific country only. Palo Alto Networks detected massive number of…

Read More
Decryption Tool Developed by Talos for PyLocky Ransomware 1

Decryption Tool Developed by Talos for PyLocky Ransomware

A free decryption tool for recovering files that have been encrypted by the PyLocky has been released by Cisco’s Talos Intelligence Group. Written in python PyLocky is ransomware masquerading as…

Read More

Page 6 of 25

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register