Quick Heal finds over 180 million threats to Windows OS

[Sept 21, 2018] Global Internet security firm Quick Heal Technologies has detected more than 180 million threats on desktops and laptops with Windows Operating System in India. According to the quarterly threat report released by the firm on Wednesday, more than 2 million malware, 16,000 ransomware, 13,000 crypto-mining malware, 141,000 exploits, and 40,488 potentially unwanted... Continue Reading →

3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web Marketplace

[Sept 21, 2018] Cybercriminals listed 3000 Hacked websites access for sale in Russian based underground marketplace that sells for less than $50. The underground marketplace is the best area for criminals where they can sell and buy various malicious software and stolen data for a very cheapest price. These websites belong to the breaches that... Continue Reading →

New Malware Combines Ransomware, Coin Mining and Botnet Features in One

[Sept 20, 2018] An all-in-one, destructive malware strain has been discovered in the wild that features multiple malware capabilities including ransomware, cryptocurrency miner, botnet, and self-propagating worm targeting Linux and Windows systems. Dubbed XBash, the new malware, believed to be tied to the Iron Group. According to the researchers from security vendor Palo Alto Networks,... Continue Reading →

Surveillance camera vulnerability could allow hackers to spy on and alter recordings

[Sept 18, 2018] In newly published research, security firm Tenable reveals how popular video surveillance camera software could be manipulated, allowing would-be attackers the ability to view, disable or otherwise manipulate video footage. The vulnerability, which researchers fittingly dubbed “Peekaboo,” affects software created by NUUO, a surveillance system software maker with clients including hospitals, banks... Continue Reading →

Apple Releases Multiple Security Updates

[Sept 18, 2018] Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. NCCIC encourages users and administrators to review Apple security pages for the following products and apply the necessary updates: Apple Support 2.4 for iOS(link is external)... Continue Reading →

Blog at WordPress.com.

Up ↑