Computer security

Log4j Vulnerability exploiters evolve the attack vector to mine Monero

Cyber criminals are exploiting the Apache Log4j vulnerability and have switched their maneuvers from LDAP callback URLs to RMI or…

3 years ago

Anubis Android Malware is back and targeting 394 financial apps

The famous Anubis Android Malware makes a return targeting around 394 financial organizations in the latest malware campaign that is…

3 years ago

Patch the Log4Shell vulnerability now to avoid a data breach

Security researchers from Cybereason has published a 'Vaccine' that can be used as a mitigation to the critical 'Log4Shell' vulnerability…

3 years ago

Top 5 Brute-Force Attack Tools for 2022

While most of the brute-force attack tools here are good for a start, we've ordered them based on the popularity…

3 years ago

ALPHV BlackCat Ransomware – The most sophisticated ransomware of 2021

A new ransomware is discovered, it is named as the ALPHV aka BlackCat ransomware and is found to be the…

3 years ago

Top 5 Password Managers for 2022 – Best Password Management Software

Find out the top 5 password managers for 2022 and see which suits your network requirement better. Choose the best…

3 years ago

Cuba Ransomware hits 49 US organizations says the FBI

The FBI has identified and disclosed that 49 US organizations have been compromised by Cuba Ransomware Gang.

3 years ago

Planned Parenthood Los Angeles data breach has affected 400K patients

Planned Parenthood Los Angeles has been hit by a cyberattack and has disclosed a data breach after a ransomware attack…

3 years ago

IKEA hit by a specially orchestrated phishing attack

IKEA became a victim to a ongoing cyberattack on June 26th, and was battling the same as their employee email…

3 years ago

Zero-day vulnerability with privilege escalation affecting Windows devices

An exploit has been recently disclosed by a security researchers for a Windows based zero-day vulnerability. This is a zero-day…

3 years ago