New Purple Fox version includes Rootkit and implements wormable propagation
Researchers from Guardicore have spotted a new variant of the Purple Fox Windows malware that implements worm-like propagation capabilities. Researchers...
Researchers from Guardicore have spotted a new variant of the Purple Fox Windows malware that implements worm-like propagation capabilities. Researchers...
A critical flaw in the official Facebook for WordPress plugin could be abused exploited for remote code execution attacks. Researchers...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we...
According to the warning by GCHQ's cybersecurity arm, NCSC, there has been a substantial spike in the number of ransomware...
How many websites are hacked every day? How frequently do hackers attack? Are there any solutions to fix the vulnerabilities?...
Lindy Cameron, executive director of Britain's National Cyber Security Center (NCSC), said on Friday that the Russian Federation poses the...
A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news...
Taiwanese manufacturer QNAP published an alert urging its customers to secure their devices after a growing number of users reported...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
According to a proposed executive order of the Biden administration, software vendors would have to disclose breaches to U.S. government...
Clop ransomware operators now email victim’s customers and ask them to demand a ransom payment to protect their privacy to...
Researchers spotted a sophisticated Android spyware that implements exfiltration capabilities and surveillance features, including recording audio and phone calls. Experts...
Researchers at Avast have found an aggregate of 204 fleece ware applications with over a billion downloads and more than...
As the domain name suggests, Guns.com is a major Minnesota, US-based platform to buy and sell guns online. It is...
Weintek's human-machine interface (HMI) products include three types of critical vulnerabilities, according to a cybersecurity researcher - who specializes in...
An obscure monetarily spurred threat group is utilizing the self-proclaimed Hades ransomware variant in cybercrime activities that have affected at...
Apple has released new out-of-band updates for iOS, iPadOS, macOS and watchOS to address another zero‑day flaw, tracked CVE-2021-1879, actively...
Several members of the German Parliament (Bundestag) and other members of the state parliament were hit by a targeted attack...
Accenture security researchers published an analysis of the latest Hades campaign, which is ongoing since at least December 2020. Accenture’s Cyber Investigation &...
If you or anyone you know is committing the below social media sins, it’s time to change that habit of...
Two new vulnerabilities have been found in Intel processors. They are undocumented capabilities of the manufacturer that allow hijacking control...
AdaptiveMobile security researchers have discovered a major flaw in the architecture of 5G network slicing and virtualized network functions. This...
White hat hackers have disclosed a significant leak of client information by online forex dealer FBS Markets. This incorporates a...
The ransomware gang REvil introduced a special malware feature that allows attackers to reboot infected devices after encryption. REvil emerged...