General Security News
-
How to Combat Ransomware Attacks with Zero Trust
Ransomware is on the rise. In fact, it is estimated that a new attack will occur every 11 seconds. By the time it takes you to read this...
-
Researchers Detail PureCrypter Loader Cyber Criminals Using to Distribute Malware
Cybersecurity researchers have detailed the workings of a fully-featured malware loader dubbed PureCrypter that's being purchased by cyber...
-
Chinese 'Gallium' Hackers Using New PingPull Malware in Cyberespionage Attacks
A Chinese advanced persistent threat (APT) known as Gallium has been observed using a previously undocumented remote access trojan in its espionage...
-
A Complete Malware Analysis Tutorials, Cheatsheet & Tools list for Security Professionals
Analyzing the malware to breakdown its function and infection routine is a kind of tough job. here we describing the complete Malware Analysis...
-
Kali Linux Team to Offer Free Access to Penetration Testing Course
The developers of Kali Linux, Offensive Security, have announced that they will be releasing a free video training course later this month on...
-
Iranian Hackers Spotted Using a new DNS Hijacking Malware in Recent Attacks
The Iranian state-sponsored threat actor tracked under the moniker Lyceum has turned to using a new custom .NET-based backdoor in recent campaigns...
-
MIT Researchers Discover New Flaw in Apple M1 CPUs That Can't Be Patched
A novel hardware attack dubbed PACMAN has been demonstrated against Apple's M1 processor chipsets, potentially arming a malicious actor with the...
-
Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions
The threat cluster dubbed UNC2165, which shares numerous overlaps with a Russia-based cybercrime group known as Evil Corp, has been linked to...
-
Thông tin bị rò rỉ của Conti tiết lộ sự quan tâm của băng nhóm Ransomware này đối với các cuộc tấn công dựa trên Firmware
Một phân tích về các cuộc trò chuyện bị rò rỉ từ nhóm ransomware Conti khét tiếng vào đầu năm nay đã tiết lộ rằng nhóm này đã luyện tập...
-
Beware of Fake CCleaner Search Results that Deliver Information-stealing Malware
The recently emerged ‘FakeCrack’ campaign has been disclosed by the researchers of Avast. The malware campaign tempts users into downloading...
-
Researchers Disclose Critical Flaws in Industrial Access Control System from Carrier
As many as eight zero-day vulnerabilities have been disclosed in Carrier's LenelS2 HID Mercury access control system that's used widely in...
-
New Privacy Framework for IoT Devices Gives Users Control Over Data Sharing
A newly designed privacy-sensitive architecture aims to enable developers to create smart home apps in a manner that addresses data sharing...