Quantcast
Channel: Information Security News|Cyber Security|Hacking Tutorial
Browsing all 1097 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Tech support scammers are tricking people to install ransomware and later...

A Microsoft security team has been closely monitored a cybercriminal group identified as BazarCall, dedicated to the deployment of tech support scams using call centers for the distribution of a...

View Article


Image may be NSFW.
Clik here to view.

Netfilter gaming driver is a Chinese backdoor approved by Microsoft....

In a recent statement, Microsoft confirmed that Netfilter, a malicious driver distributed within some gaming environments, was signed by the company. Karsten Hahn, researcher at security firm G Data,...

View Article


World’s richest hacker group now focusing on Linux and NAS devices with new...

A recent report notes that REvil ransomware operators are now employing a Linux encryption tool to start attacking virtual machines like VMware ESXi. This could be an especially prolific time for...

View Article

Image may be NSFW.
Clik here to view.

Why everybody wants XLoader, the new malware with remote access, keystroke...

A recent report from Check Point Research (CPR) points to the detection of a new malware variant designed to infect Windows and macOS devices. This malware was identified as XLoader and is for sale...

View Article

Image may be NSFW.
Clik here to view.

These 13 malware variants are used to hack and take control of Pulse Secure...

In its most recent report, the Cybersecurity and Infrastructure Security Agency (CISA) alerted users of Pulse Secure devices to the discovery of at least 13 malware samples found on affected devices....

View Article


Image may be NSFW.
Clik here to view.

Don’t pay Babuk ransomware hackers; their decryptor doesn’t work and hackers...

A McAfee security report notes that Babuk ransomware operators have been implementing some new attack mechanisms to infect Linux, UNIX, and VMware systems, which would allow for the engagement of...

View Article

Image may be NSFW.
Clik here to view.

Android malware Vultur uses VNC remote access to steal passwords

Cybersecurity specialists report the detection of a new Android-based remote access Trojan (RAT) that is capable of recording the screen of the affected user in order to steal sensitive information...

View Article

Image may be NSFW.
Clik here to view.

Prometheus: the hacking platform that helps cybercriminals to attack as many...

A new cybercriminal operation identified as Prometheus is helping multiple hacking groups distribute malware across various compromised websites. Researchers point out that Prometheus operates a...

View Article


Image may be NSFW.
Clik here to view.

Lockbit ransomware hacks Accenture, encrypts 2,500 computers, steals 6 TB of...

Tech firm Accenture has confirmed that its systems were compromised by a ransomware attack allegedly deployed by LockBit 2.0 operators. In addition to encrypting thousands of files, hackers threaten...

View Article


Image may be NSFW.
Clik here to view.

The Mozi IoT botnet evolved to gain persistence on Netgear, Huawei, and ZTE...

Cybersecurity specialists report the detection of a new version of the Mozi botnet that is now capable of manipulating the web traffic of the affected implementations using DNS spoofing techniques and...

View Article

Image may be NSFW.
Clik here to view.

Cybercriminals are signing malware in new way to prevent detection: new...

The experts of Google Threat Analysis Group, specialized in the investigation of state hacking campaigns, electronic fraud and disinformation, report the detection of a new evasion technique used by...

View Article

Image may be NSFW.
Clik here to view.

GhostEmperor: New Chinese virus to take control of your devices and make you...

A report presented by Kaspersky Labs experts points to the detection of a Chinese cyberespionage group that has attacked multiple targets in South Asia since mid-2020.  Identified as GhostEmperor,...

View Article

Image may be NSFW.
Clik here to view.

FontOnLake: a killer backdoor cocktail with a rootkit for Linux

Cybersecurity specialists report the detection of a new malware family that is hidden in legitimate binaries for the infection of Linux systems. Identified as FontOnLake, this set of malicious tools...

View Article


Image may be NSFW.
Clik here to view.

3 malicious npm JavaScript libraries recently discovered can install crypto...

The developers of Sonatype, an automated malware detection system, report the finding of a set of malicious packages in the npm registry; According to the report, these malicious payloads are hidden...

View Article

Image may be NSFW.
Clik here to view.

Largest botnet with control of millions of devices discovered. THE PINK BOTNET

Researchers from the firm Netlab Cybersecurity report the detection of a massive new botnet capable of launching powerful denial of service (DoS) attacks thanks to the detection of more than 1.5...

View Article


Image may be NSFW.
Clik here to view.

New research: Millions of Huawei smartphones are inflected with malware

Specialists from the security firm Dr Web report the detection of multiple applications infected with malware in AppGallery, the official application store for Huawei devices. The apps are infected...

View Article

Image may be NSFW.
Clik here to view.

Tardigrade: The new malware that only targets medicine and vaccine...

According to the Bioeconomy Information Sharing and Analysis Center (BIO-ISAC), multiple facilities dedicated to the manufacture and development of drugs are being attacked by a new malware variant...

View Article


Image may be NSFW.
Clik here to view.

YouTube search of free games show Trojan links. Be careful when trying out...

During the Christmas season, the risks of cyberattack increase for multiple targets, including the gamer community. Cybersecurity experts report that this is because several developers decide to...

View Article

Image may be NSFW.
Clik here to view.

17 malicious packages in the Node.js package manager (npm) code repository...

Cybersecurity specialists report the detection of a set of malicious packages in Node.js package manager repository (npm) designed to collect Discord tokens and eventually take control of the affected...

View Article

Image may be NSFW.
Clik here to view.

This 12Kb-sized ransomware can exploit Log4j critical vulnerability and...

For days now, the cybersecurity community has been following the active exploitation of CVE-2021-44228, a critical vulnerability in the Log4j log library. Among the multiple reports that have appeared...

View Article
Browsing all 1097 articles
Browse latest View live