Malware Takes Advantage of Windows ‘God Mode’
Microsoft Windows has hidden an Easter Egg since Windows Vista. It allows users to create a specially named folder that acts as a shortcut to Windows settings and special folders,Read More →
Microsoft Windows has hidden an Easter Egg since Windows Vista. It allows users to create a specially named folder that acts as a shortcut to Windows settings and special folders,Read More →
How does the U.S. government beat Tor, the anonymity software used by millions of people around the world? By hiring someone with experience on the inside. A former Tor ProjectRead More →
A group cyber criminals created Ran$umBin, A Dark web service which operates the one-stop shop for monetizing ransomware. These days Ransomware are quite common and it is widespread and heavilyRead More →
These days cyber attacks occur not only in large companies but also in small businesses in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, India etc accordingRead More →
Flaw allowed anyone to edit & take control over .as domains. A British security researcher that goes online only by the name of InfoSec Guy revealed today that American Samoa domainRead More →
Hackers leak 1.4GB database of information after breaching Qatar National Bank.A group of unknown hackers have claimed to have hacked into the servers of Qatar National Bank (QNB), based inRead More →
Yesterday, a new ransomware called TrueCrypter was discovered by AVG malware analyst Jakub Kroustek. This ransomware encrypts your data using AES-256 encryption and then demands either .2 bitcoins or $115 USD inRead More →
Recently we observed an Android malware family being used to attack users in Russia. The malware samples were mainly distributed through a series of malicious subdomains registered under a legitimateRead More →
Unknown group attacked South East Asian targets, sometimes for years at a time. Microsoft’s Windows Defender Advanced Threat Hunting team works to track down and identify hacking groups that perpetrate attacks. TheRead More →
Last week Kafeine posted an analysis of a new ransomware called CryptXXX on the Proofpoint blog. Based on their analysis they determined that CryptXXX is affiliated with the developers of theRead More →