The gang responsible for the Maze ransomware family conducted an attack in which they distributed their malware payload inside of a virtual machine (VM). The attackers packaged the ransomware payload…
Cybercriminals have been using ngrok—a cross-platform application to expose local development servers to the internet, for malicious purposes for years now. An organization was targeted by a keylogger, where malicious…
A researcher discovered a new zero-day vulnerability in most Windows 10 editions, which allows creating files in restricted areas of the operating system. Exploiting the flaw is trivial and attackers…
The CVE-2020-1472 flaw is an elevation of privilege that resides in the Netlogon. The Netlogon service is an Authentication Mechanism used in the Windows Client Authentication Architecture which verifies logon…
A new Shlayer macOS malware variant which obfuscates itself to sneak past security tools and compromise a target machine. Dubbed ‘ZShlayer’, the variant does not conform to the original Shlayer…
Here we had covered lot many threats , Vulnerability related to Windows a lot and covered little about linux . It's not mean that later OS is safer .. it's…
A vulnerability in the ubiquitous Bluetooth wireless standard could enable hackers to connect to devices remotely in a given area and access users’ applications dubbed Blurtooth Bluetooth is found in…
As part of this month's Patch Tuesday, Microsoft today released a fresh batch of security updates to fix a total of 129 newly discovered security vulnerabilities affecting various versions of…