TeamTNT’s New Tools Target Multiple OS
The TeamTNT malware pushers have a slew of new toys that have inflicted more than 5,000 infections globally as antivirus (AV) tools struggle to catch up with the newest malware. click here to read...
The TeamTNT malware pushers have a slew of new toys that have inflicted more than 5,000 infections globally as antivirus (AV) tools struggle to catch up with the newest malware. click here to read...
CVE-2021-21832 can cause memory corruption in the application if the user opens an adversary-created ISO file that causes an integer overflow. This flaw exists in the way the application parses ISOs. click here to...
Tomer Bar, Director, Security Research, SafeBreach Peleg Hader, Senior Security Researcher, SafeBreach At SafeBreach, we… Two New Tools and Techniques to Find, Fight O-Days on Latest Hacking News. click here to read full Article...
According to a copy of the dump obtained by The Record, the leaked files contain the source code of the FIFA 21 soccer game, including tools to support the company’s server-side services. click here...
Palo Alto Networks provides details about the methods and tactics employed by the Mespinoza ransomware group that has been targeting multiple sectors across the globe with a focus on the education sector. The ransomware...
17 free cybersecurity tools you should know about click here to read full Article Read More on latest Security Updates
Kaspersky spotted WildPressure APT group deploying a new malware to target businesses in the oil and gas sector, through both Windows and macOS systems. Experts also noted some similarities in the techniques of the WildPressure...
–> You will need to convert PDF files into PPTX files at some time in your life to avoid entering the full content of the PDF file into PPTX. Retyping is a time-consuming and...
Cobalt Strike has become one of the most misused tools in the cybercrime world as a recent report showed a 161% year-pn-year increase in cyberattacks using this tool. This tool is now used by...
Styra’s Series B round of funding led by Battery Ventures. Also participating are previous backers A. Capital, Unusual Ventures and Accel; and new backers CapitalOne Ventures and Citi Ventures. click here to read full...
As Linux attracts more attention from malicious actors, researchers have seen threats evolving — abusing services like Ngrok and using functions to hunt and kill other competing malware. click here to read full Article...
Although there is nothing sophisticated about HackBoss, the scheme proves to be effective as it tempts victims with the prospect of getting hacking tools, mostly for brute-forcing passwords. click here to read full Article...
Talos detected a new cryptor used in several different malware campaigns hidden in files that users would usually download to install cheat codes into video games or other visual and game mods. click here...
Top benefits of SOAR tools, plus potential pitfalls to consider click here to read full Article Read More on latest Security Updates
In the case of email-based phishing methods, scammers are taking their game up a notch as they open avenues for targeted attacks, BEC attacks, and ransomware, among other infections. click here to read full...
Microsoft releases tools as Exchange Server attacks increase click here to read full Article Read More on latest Security Updates