Android Smartphones Targeted by WannaCry Lookalike
Crooks in China have developed an Android ransomware that uses similar graphics to the WannaCry ransom note in an attempt to scare and trick users into quickly paying the ransom.Read More →
Crooks in China have developed an Android ransomware that uses similar graphics to the WannaCry ransom note in an attempt to scare and trick users into quickly paying the ransom.Read More →
Cryptocurrency mining malware has come a very long way over the past few years. Whereas Bitcoin used to be the center of attention in the beginning, this type of miningRead More →
A staggering 8,000 vulnerabilities have been discovered in one of the most widespread medical advancements keeping people alive today: The pacemaker. White Scope, which has reported all of the vulnerabilitiesRead More →
Earlier this afternoon, the Intercept reported that according to a “top secret NSA document”, Russian Military Intelligence “executed a cyberattack on at least one U.S. voting software supplier and sentRead More →
An American conman who ran a bogus bitcoin mining scheme has been ordered to pay a $12m (£9.2m) fine. Homero Joshua Garza told investors he would use custom-built computers toRead More →
Days after a malware called “Judy” hit over 36.5 million Android-based phones, Google has now increased the bounty for finding a bug in Android OS to as much as $2,00,000,Read More →
A new malware called ‘Judy’ is now infecting millions of Android smartphones globally close on the heels of ‘WannaCry’ holding PCs at ransom, says a report. According to security solutionsRead More →
The hack targets computers worldwide running on Microsoft Windows 2003 It exploits a known flaw in the servers, triggering a buffer overflow This allows hackers to remotely access theRead More →
For almost four months, script kiddies ran amok in one of Stanford’s subdomains, installing web shells, mailers, and other types of web malware. The infection was noticed last week byRead More →
Customer account-only support page warns of “ability to decrypt encrypted data.” OneLogin has admitted that the single sign-on (SSO) and identity management firm has suffered a data breach. However itsRead More →
A man linked to an auto parts store in a disputed territory of Moldova is behind the Bachosens malware, a backdoor trojan used in a very small number of attacks,Read More →
The U.S. Department of Homeland Security has identified dark web users after they downloaded media through a file sharing services. The DHS obtained the IP addresses of several suspects that visitedRead More →
Several Linux distros have issued updates to fix a vulnerability in Sudo, a Linux app behind the “sudo” command, which can allow an unprivileged attacker to gain root privileges. TheRead More →
In April, a group known as the “Shadow Brokers” released a cache of stolen information that included multiple tools to exploit vulnerabilities in various versions of Microsoft Windows. The mostRead More →
I’ve previously written about fuzz testing, which feeds intelligently crafted input to a target program to exercise corner cases and find bugs, highlighting how Fastly uses American Fuzzy Lop toRead More →
A hacker that goes by the nickname of Cipher0007 has hacked the Sanctuary Dark Web marketplace. The hacker announced the breach a few hours ago and also posted proof ofRead More →
Moscow-based threat intelligence firm Group-IB published a report that details evidence linking the Lazarus APT Group to North Korea. Researchers at security firm Group-IB released a report that links theRead More →
The FBI has arrested members of a motorcycle gang accused to have hacked and stolen over 150 Jeep Wranglers from Southern California, which they later crossed the border into MexicoRead More →
Known as USA 276, it looks to be headed for the International Space Station, says one amateur spy satellite tracker. Then again, it could change course. The secret spy satelliteRead More →
In what has become a welcome trend, today another ransomware master decryption key was released on BleepingComputer.com. This time the key that was released is for the XData Ransomware thatRead More →