Cyber Security
Attackers have developed the Mozi botnet so that the malware can achieve persistence on routers and network gateways. Mozi is a peer-to-peer botnet, active for two...
Hi, what are you looking for?
Attackers have developed the Mozi botnet so that the malware can achieve persistence on routers and network gateways. Mozi is a peer-to-peer botnet, active for two...
Since 2019, Pegasus users have been able to install the software on smartphones with a missed call on WhatsApp. End-to-end encryption is technology that...
No More Ransom has celebrated its fifth anniversary of helping victims to recover from ransomware attacks. The decryptors available in the No More Ransom repository have...
FILE – This Feb 23, 2019, file photo shows the inside of a computer in Jersey City, N.J. A ransomware attack paralyzed the networks...
A new variant of the IcedID banking trojan has been discovered that spreads via two new spam campaigns. These campaigns are hitting more than...
Security researchers have found a new batch of malicious Android applications trying to lure victims by impersonating popular applications. The targeted applications were mostly...
GitHub announced on Friday their updated community guidelines that explain how the company will deal with exploits and malware samples hosted on their service....
Microsoft states that a Russian hacking group used four new malware families in recent phishing attacks impersonating the United States Agency for International Development...
Four people have pleaded guilty to providing ‘bulletproof’ hosting services used by cybercriminals to distribute malware and launch other cyber-attacks. The individuals – Aleksandr...
The Mauritian government is considering plans to monitor and censor social media by intercepting web traffic. In a consultation document (PDF), the country’s Information and Communication...
Recent Comments