Microsoft Warns Rise in XorDdos Malware Targeting Linux Devices

0
A Linux botnet malware known as XorDdos has witnessed a 254% surge in activity over the last six months, according to latest research...

Cytrox’s Predator Spyware Target Android Users with Zero-Day Exploits

0
Google's Threat Analysis Group (TAG) on Thursday pointed fingers at a North Macedonian spyware developer named Cytrox for developing exploits against five zero-day...

Researchers Uncover Rust Supply-Chain Attack Targeting Cloud CI Pipelines

0
A case of software supply chain attack has been observed in the Rust programming language's crate registry that leveraged typosquatting techniques to publish...

Hackers Exploiting VMware Horizon to Target South Korea with NukeSped Backdoor

0
The North Korea-backed Lazarus Group has been observed leveraging the Log4Shell vulnerability in VMware Horizon servers to deploy the NukeSped (aka Manuscrypt) implant...

Hackers Trick Users with Fake Windows 11 Downloads to Distribute Vidar Malware

0
Fraudulent domains masquerading as Microsoft's Windows 11 download portal are attempting to trick users into deploying trojanized installation files to infect systems with...

QNAP Urges Users to Update NAS Devices to Prevent Deadbolt Ransomware Attacks

0
Taiwanese network-attached storage (NAS) devices maker QNAP on Thursday warned its customers of a fresh wave of DeadBolt ransomware attacks. The intrusions are said...

New Bluetooth Hack Could Let Attackers Remotely Unlock Smart Locks and Cars

0
A novel Bluetooth relay attack can let cybercriminals more easily than ever remotely unlock and operate cars, break open residential smart locks, and...

7 Key Findings from the 2022 SaaS Security Survey Report

0
The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the eyes of CISOs...

High-Severity Bug Reported in Google’s OAuth Client Library for Java

0
Google last month addressed a high-severity flaw in its OAuth client library for Java that could be abused by a malicious actor with...

Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit

0
A new research published by academics from KU Leuven, Radboud University, and the University of Lausanne has revealed that users' email addresses are...

Stay connected

0FansLike
3,321FollowersFollow
0SubscribersSubscribe

Latest article

How to Control Greed When Trading

0
- Reviewed by James Stanley, Nov. 24, 2021Greed is a natural human emotion that affects individuals to varying degrees. Unfortunately, when viewed in...

CFTC Chairman Confirms Bitcoin, Ether Are Commodities – Regulation Bitcoin News

0
The chairman of the U.S. Commodity Futures Trading Commission (CFTC) says he is certain bitcoin and ether are commodities. He outlined how his...

Russian Appellate Court Cancels Decision to Block Tor Project’s Website – Bitcoin News

0
A court of appeals in Russia has overturned a ruling by a regional court which allowed the blocking of the Tor Project’s website...