As time goes ... One after another Ransomware come and goes. Like we say it's summer.. winter.. Rainy.. Spring seasons.. Once released it's been a talk of town and one…
An Iranian hacking group known as Oilrig has become the first publicly known threat actor to incorporate the DNS-over-HTTPS (DoH) protocol in its attacks. Oilrig operators began using a new…
Three agencies of the US government have published today a joint alert alerting US private entities about new versions of Taidoor, a malware family previously associated with Chinese state-sponsored hackers.…
The native antivirus client of the Windows 10 operating system, Microsoft Defender, has started to flag the hosts file on the system as malicious if it contains redirects for certain…
Google's Project Zero security team, there have been 11 zero-day vulnerabilities exploited in the wild in the first half of the year. 2020 H1 ZERO-DAYS 1. Firefox (CVE-2019-17026) This zero-day…
Attackers always seek out new ways to evade detection. As most endpoint security products handle file-based attacks relatively well, scripts are an excellent way for attackers to avoid making changes…
Threat researchers have found a new feature-rich malware that can encrypt files on any system running PHP, making it a high risk for Windows, macOS, and Linux web servers. The…
Cisco data center flaws Cisco Data Center Network Manager flawsCisco Data Center Network Manager is the network management platform for all NX-OS-enabled deployments, spanning new fabric architectures, IP Fabric for…