Buggy Malware Attack on WordPress Websites Exploiting New Bugs

Researchers discovered an ongoing buggy malware campaign that attempts to exploit the newly discovered vulnerabilities resides in the WordPress theme and plugin. Cybercriminals are always curious about developing the exploits soon...

How Virtual Reality Can be the Future of Education

One of the major problems that students battle with is understanding very abstract parts of...

New Instagram Data Leaking Bug Let Hackers to Access Account Details

Facebook confirmed a new Instagram data-leaking bug that puts user data under risk. The vulnerability lets hackers access sensitive information such as account details and phone numbers. The vulnerability in Instagram...

APT trends report Q3 2019

For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

Nmap 7.80 – 80+ Improvements with Bug Fixes, Npcap, NSE Scripts/libs

The new version of Nmap 7.80 released in Defcon, Vegas by Gordon Fyodor, network security and created of Nmap. This new version of Nmap 7.80 upgraded with more than 80...

2019 Was a Fruitful Year for Cybercriminals – High Profile Data Breaches

What a time to be alive. We have tons of information at the tips of our fingers, we can get in touch with that distant cousin from the other corner...

Unpatched Spoofing Flaw in UC Browser Exposes 600M Users to Phishing

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by the security...

Hackers Embedded the Malicious Code Within WAV Audio Files

Researchers observed a new malware campaign using WAV audio files to hide the malware and to avoid detection. Threat actors embedded the malicious code within the WAV audio files. Based on...

LATEST NEWS

MUST READ