Hackers Injecting Crypto-mining Malware into Legitimate PDF Software

Cybercriminals using a new type of attack called Evil clone to inject Cryptocurrency malware into legitimate PDF software to Mine cryptocurrency with the help of CoinHive miner. Cryptocurrency malware is dramatically...

How hiring cheap assignment writing tips

There are lots of things students should have to mange with the writing of assignment completion. Problem is that any kind...

Hackers Constantly Carrying out Password Stealing Attacks

Cyber Criminals are constantly targeting financial networks that lead to stole customer login details and the percentage of Password Stealing Attacks are on the rise. Hackers constantly targeting login pages of...

Russians are now in the list of Highest Pirated Movies Viewers

Piracy is a serious threat that affects the film industry, Group-IB observed record high pirated movies views in Russia and the market has grown by 21% since 2016. The search queries...

Pegasus Spyware Conducting Surveillance Operations in 45 Countries

New research reveals that Israel based NSO Group using powerful mobile based Pegasus Spyware to conducting massive surveillance in 45 countries across the globe. NSO Group is operating from Israel where...

Most Important USB Memory Sticks based Cyber Attack Mitigation Steps

Among the ten major cyber threats identified by BSI in 2016, the use of portable peripheral devices ranks second. While the same agency suggests engaging in countermeasures aimed at implementing targeted procedures based...

New trends in the world of IoT threats

Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in the whole of 2017. And...

11 Million Sensitive Personal Records Exposed Online

A huge customer database with 11 million records that containing personal details such as email, full name, gender and physical address exposed online. The data to be available from the...

Wi-Fi Devices Can be Used to Detect Weapons and Bombs

Dangerous Objects such as weapons, Bombs, and chemicals that are hidden in baggage can be detected with Wi-Fi signals from normal Wi-Fi devices without opening it. Researchers from Rutgers University demonstrated...

Understanding Windows Event logs for Cyber Security Operations Center

Cyber Security operations center is protecting organizations and sensitive business data of customers. It ensures active monitoring of valuable assets of business with visibility, alerting and investigating threats and a...

LATEST NEWS

MUST READ