Intel Isreal breached

Intel Isreal breached

Hackers using Pay2key malware, which in the past has been used by Iranian hacking groups, announced on Twitter that they had managed to hack into the systems of Intel-owned and…
Mount Locker’s Double extortion offer

Mount Locker’s Double extortion offer

The Mount Locker ransomware,has already gained notoriety for stealing files before encryption and demanding ransom amounts in the millions to prevent public disclosure of stolen data, a tactic known as…
WinZip Vulnerability

WinZip Vulnerability

Number of vulnerabilities in the WinZip file compression software that could be used to inject malware into a user’s device. The insecurities reside within the server-client communication channel. Few versions…
Adrozek malware hijacks browsers

Adrozek malware hijacks browsers

Microsoft on Thursday took the wraps off an ongoing campaign impacting popular web browsers that stealthily injects malware-infested ads into search results to earn money via affiliate advertising. "Adrozek," as…
Malwareless Ransomware pwned database

Malwareless Ransomware pwned database

A “malwareless” ransomware campaign delivered from UK IP addresses targeting weak security controls around internet-facing SQL servers successfully pwned 83,000 victims, according to Israeli infosec biz Guardicore. “The attack chain…
APT28 FANCY BEAR

APT28 FANCY BEAR

A Russian threat actor known for its malware campaigns has reappeared in the threat landscape with yet another attack leveraging COVID-19 as phishing lures. Linking the operation to a sub-group…
VMWare Flaw actively expolited

VMWare Flaw actively expolited

NSA warned that Russian state hackers are compromising multiple VMware systems in attacks that allow the hackers to install malware, gain unauthorized access to sensitive data, and maintain a persistent…