Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar

One of the most powerful, infamous, and advanced piece of

New Mac Malware Exploits GateKeeper Bypass Bug that Apple Left Unpatched

Cybersecurity researchers from Intego are warning about possible active exploitation

This Cryptomining Malware Launches Linux VMs On Windows and macOS

Cybersecurity researchers from at least two firms today unveiled details

Firefox 67.0.4 Released — Mozilla Patches Second 0-Day Flaw This Week

Okay, folks, it’s time to update your Firefox web browser

GandCrab Ransomware Decryption Tool [All Versions] — Recover Files for Free

Cybersecurity researchers have released an updated version of GandCrab ransomware

Malicious Apps from Google PlayStore Bypassing SMS-Based Two-Factor Authentication and Steal OTPs in SMS

Researchers discovered new malicious Android apps from Google Play Store

New Android Malware that Uses Chrome to Load Malicious websites through Notifications

New malware spotted on Google play that directs users to

FIN8 Hacker Group using Highly Sophisticated ShellTea Malware to Attack Hospitality Sector

FIN8 hacker group is back with a new highly sophisticated

Hackers Exploit Critical Oracle WebLogic Server Vulnerability by Hiding Malware in Certificate Files(.cer)

Hackers abuse Oracle WebLogic Server Vulnerability CVE-2019-2725 to deliver Monero

Iranian MuddyWater APT Hackers Adds New Exploits in Their Hacking Arsenal to Attack Government Networks

Threat actors from MuddyWater APT groups now add a new

BlackSquid Malware Uses Eight Exploits to Attack Web Servers, Network Drives, and Removable Drives

A new malware dubbed BlackSquid bags eight notorious exploits to

Top 5 ATM Malware Families Used By Hackers to Dispense Money from Targeted ATMs

ATM-Based cyber attacks are continually evolving with much more advanced

Hackers Abusing Microsoft Azure to Deploy Malware and C2 Servers Using Evasion Technique

Now Microsoft Azure becomes a sweet spot for hackers to

Dangerous GandCrab Ransomware Shutting Down its Operations after Earning $2 Billion in Ransom Payments

Gandcrab ransomware first spotted in January 2018, and it is

Hackers Use Linux Malware HiddenWasp to Attack Linux Systems for Gaining Remote Access

A new sophisticated, unique Linux malware dubbed HiddenWasp used in

Hackers Infect 50,000 MS-SQL and PHPMyAdmin Servers with Rootkit Malware

Cyber Security researchers at Guardicore Labs today published a detailed

New Variant of Mirai Malware Using 13 Different Exploits to Hack Routers Including D-Link, Linksys, GPON, Netgear, Huawei

Researchers discovered a new wave of Mirai Variant that used

World’s Most Dangerous Laptop With 6 Popular Malware Sold at $1.3 million

The Laptop loaded with six most dangerous pieces of malware

Chinese APT 10 Hackers Attack Government and Private Organizations Through Previously Unknown Malware

Researchers discovered a new malware attacker against the government and

Hackers using HawkEye Keylogging Malware to Attack Enterprise Networks to Steal Application Data

Hackers behind the new HawkEye malware campaign targets business users

Fancy Bear APT Hackers Owned Zebrocy Malware Opens Backdoor on Victims Machine to Control it Remotely

Cybercriminals from Sednit group, also known as Fancy Bear, APT28,

Shade Ransomware Attack Enterprise Networks through Weaponized PDF Files & Malspam Emails

Shade Ransomware emerged in late 2014; it includes malicious spam

MuddyWater APT’s BlackWater Malware Campaign Install Backdoor on Victims PC to Gain Remote Access & Evade Detection

Researchers discovered a “Blackwater” malware campaign that suspected to associated

Hackers Launching Unique Windows and MacOS Malware via Fake WhatsApp Official Website

Researchers discovered a new malware that infect MacOS via malicious

Hacker Group Behind GozNym Banking Malware Dismantled by International Authorities that Stolen $100 Million

International law enforcement operation brings down a globally operated and

RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

A critical remote execution vulnerability in Microsoft remote desktop services

Hackers Distribute PLEAD Malware through Supply-chain and man-in-the-middle Attack

Security researchers a new malware campaign that delivers Plead malware

Flaw Affecting Millions of Cisco Devices Let Attackers Implant Persistent Backdoor

Researchers have discovered a severe vulnerability in Cisco products that

Microsoft Published a List of Legitimate Apps that Hackers Abuse to Bypass Windows Defender

Microsoft published legitimate apps that can be abused by attackers

Dharma Ransomware Abusing Legitimate Anti-virus Tool to Trick Victims And Infect Their Computers

A new variant of Dharma ransomware masquerading as an ESET