New details have emerged about a vast network of rogue extensions for Chrome and Edge browsers that were found to hijack clicks to links in search results pages to arbitrary…
Researchers found that NoxPlayer's latest updated mechanism, which is an android emulator for macOS and Windows, was attacked by hackers. The attacker used the hack to corrupt gamer systems with…
A new ransomware called Vovalex is being distributed through pirated software that impersonates popular Windows utilities, such as CCleaner. According to the D website, Dlang is inspired by C++ but shares components…
FonixCrypter Ransomware active since 2020, the operators behind the threat shut down their operations and released the master decryption ke. The availability of the master decryption key allows the victims…
Pro Ocean known to be Cloud-targeted malware for carrying out crypto-jacking attacks for Monero used by Roche's group . The threat actors behind the attack have reportedly updated the malware…
Emotet, one of the most active and dangerous botnets, has been taken down by international authorities. This email spamming botnet has been used to distribute malicious Word attachments that further…
Researchers warned window operating system users regarding the susceptibilities of Windows 7 to blind TCP/IP hijacking attacks. Adam Zabrocki reported the vulnerability to Microsoft reported eight years ago. Windows 7…
Clearsky researchers linked the Lebanese Cedar group (aka Volatile Cedar) to a cyber espionage campaign that targeted companies around the world active since 2012 intruding in to telecoms and ISP…