Ransomware gangs are progressively probable to break their assure not to leak stolen data as soon as a victim has compensated them, Coveware has warned. Nevertheless, the tactic has now…
A sophisticated cyber espionage campaign aimed at aerospace and defense sectors in Australia, Israel, Russia, and defense contractors based in Russia and India , whic will install data gathering implants…
APT cloaks identity using script-kiddie messages and advanced deployment and targeting techniques. Based on messages, such as “KilllSomeOne”, used in attack code strings, coupled with advanced deployment and targeting techniques,…
Fortinet has announced its latest network firewall designed to enable security-driven networking for hybrid data centers, multi-cloud environments, and even remote workforces. Fortinet created the FortiGate 2600F, powered by the…
A new ransomware called RegretLocker uses a variety of advanced features that allows it to encrypt virtual hard drives and close open files for encryption. RegretLocker was discovered earlier last…
Google has just released a fix for the second actively exploited Chrome zero-day security flaw in two weeks. CVE-2020-16009 is a v8 bug used for remote code execution,The fix applies…
A new hacker group, dubbed UNC1945, which has been observed using a vulnerability in the Oracle’s Solaris OS to hack into corporate networks. The vulnerability (CVE-2020-14871) in question affects Oracle…
A new research has demonstrated a technique that allows an attacker to bypass firewall protection and remotely access any TCP/UDP service on a victim machine. Called NAT Slipstreaming, the method…