Tracked as CVE-2019-5736, the vulnerability can be exploited with minimal user interaction. Those willing to give it a try should ensure to take a backup of […]
The phishing emails targeting brokerage firms purport to be from a legitimate credit union attempting to notify the firms about potential money laundering. These phishing emails […]
Internet Protection Firewall Alert Description “Internet Protection Firewall Alert” is the heading of some fake security alert generated by the rogue anti-virus program Internet Protection. Internet Protection is nothing more […]
Formjacking involves the use of malicious JavaScript code to steal payment card details and other information from payment forms on the checkout web pages of e-commerce […]
While conducting a routine log check, we noticed an interesting script from one of our honeypots downloading a binary connected to a domain. Upon further analysis, […]
The ransomware’s TOR site comes with a hidden private chat that can be enabled using one of the discount codes. This allows dishonest data recovery firms […]
The company says the elevation of privilege flaw affects Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 26, Microsoft Exchange Server 2013 Cumulative Update 22, […]
The new Backdoor trojan ‘SpeakUp’ exploits known vulnerabilities in six different Linux systems and even in MacOS. The malware campaign distributing SpeakUp trojan targets servers in […]
The search engine is now under investigation by UK’s Information Commissioner’s Office(ICO) after the former failed to meet GDPR guidelines. Google may face fines as large […]
WordPress is the most popular content management system which is based on PHP and MySQL. A recent study revealed that WordPress-associated vulnerabilities have seen a 30% increase […]