Reaver malware threat
Palo Alto’s Unit 42 security group has discovered a new malware family called Reaver with links to Chinese espionage group, also known for using SunOrcal malware.
Reaver malware threat Read More »
Palo Alto’s Unit 42 security group has discovered a new malware family called Reaver with links to Chinese espionage group, also known for using SunOrcal malware.
Reaver malware threat Read More »
WikiLeaks has released a new series of leaks, called Vault 8, that contains source code and analysis for software designed to run on servers controlled by the CIA.
WikiLeaks Vault 8 leaks Hive Read More »
Appthority has discovered a significant data exposure vulnerability called Eavesdropper that impacts nearly 700 enterprise apps associated with 85 Twilio developer accounts.
Eavesdropper vulnerability impacts hundreds of enterprise apps Read More »
Symantec has spotted a previously unknown cyber espionage group called Sowbug that targets South American and Southeast Asian governments.
Sowbug espionage group Read More »
McAfee Advanced Threat Research analysts have spotted new malicious techniques used by the APT28 threat group.
APT28 Group DDE attacks with Seduploader Read More »
Cyber security and investment experts offer good advice on how users can protect cryptocurrencies, such as Bitcoin and Ethereum, from hackers.
Cryptocurrency cyber security advice Read More »
Insider threats can be malicious or inadvertant, but the consequences can lead to costly brand damage or significant financial losses to your company. Understanding the types of insider threats and corresponding risk indicators can help minimize impact and damage caused by such threats.
6 Important Safeguards To Stop Insider Threats Read More »
Security researchers have discovered serious weaknesses and total breakdown in WPA2, a security protocol used to secure protected Wi-Fi networks. An attacker within range of a victim’s Wi-Fi device could exploit these weaknesses using key reinstallation attacks (KRACKs).
KRACK Wi-Fi cyber attack Read More »
A new Android banking malware dubbed LokiBot can trigger ransomware capabilities when a victim tries to remove the malware from their infected device. According to a Tripwire report , some of the additional features of LokiBot include the ability for attackers to read a victim’s SMS messages and also send out spam email to infect other users. The
LokiBot malware threat Read More »
Security researchers discovered a supply chain threat used to distribute a backdoor and multi-stage malware via legitimate software package CCleaner.
CCleaner application backdoor Read More »