Rorschach Ransomware: Fastest encryption and most dangerous ransomware of the...
Researchers at the Israeli cybersecurity firm Check Point have given the new ransomware the name “Rorschach.” They said that their incident response team identified it while looking into an attack...
View ArticleNew undetectable ransomware technique uses WinRar software to encrypt and...
The Ukrainian Government Computer Emergency Response Team (CERT-UA) has released a new alert in which it states that Russian hackers have been using hacked VPN accounts and have substituted WinRar for...
View ArticleNew dangerous ransomware encrypts itself and uses VPN flaws to encrypt...
Researchers in the field of information security have found a new strain of ransomware that has been given the name CACTUS and that infiltrates targeted networks by exploiting known weaknesses in VPN...
View ArticleProgramming using Visual Studio Code Marketplace Extensions? Your code could...
Visual Studio Code, more often known by its acronym VSCode, is a source code editor that was created by Microsoft and is available for free. It is a very effective and adaptable coding environment...
View ArticleHow cybercriminals forge digital signatures on kernel-mode malicious drivers...
Chinese-speaking threat actors have been shown to be using a Microsoft Windows policy vulnerability to spoof signatures on kernel-mode drivers. The Windows operating system (OS) is divided into two...
View ArticleDownload WormGPT and launch easy cyber attacks or hack someone using AI just...
In recent years, there has been a phenomenal expansion in the use of generative artificial intelligence (AI). Since the launch of ChatGPT in November 2022, several artificial intelligence (AI)...
View ArticleDisable WiFi in Ford & Lincoln Cars before someone hacks into your car....
A buffer overflow vulnerability was discovered not too long ago in the Wi-Fi driver that Ford employs in the SYNC 3 entertainment system. Following the identification of the vulnerability, Ford...
View Article2 Big Cloud hosting companies shutdown by ransomware and lose all customer data
Both CloudNordic and AzeroCloud, two hosting services based in Denmark, have been hit by ransomware attacks, which have resulted in the loss of the vast majority of client data and compelled the...
View ArticleHow to send malware via Teams, even “Safe Attachments” or “Safe Links” can’t...
Recent investigations suggest that malicious actors have been spreading the DarkGate Loader malware by exploiting Microsoft Teams as a delivery mechanism. The campaign was started by two external...
View ArticleVisited thesaurus.com in search for Synonyms? You have Coinminer malware...
Thesaurus is one of the most well-known platforms, with 5 million monthly visitors, and is regularly used by students, writers, and everyone else who want to enhance their vocabulary and linguistic...
View ArticleLargest soft drink bottle supplier, recycle and plastic manufacturers hacked...
Johnson Controls International plc operates globally as a conglomerate, boasting a varied array of products and services with a predominant focus on technologies and solutions for buildings. Their...
View ArticleThe Dark Side of PDFs: How Opening a Simple PDF Could Unleash a Cybersecurity...
The recent findings from McAfee Labs have unveiled a worrying trend in the cybersecurity landscape: a significant increase in malware distribution through PDF files. This revelation is particularly...
View Article