HTTP

Most Cyber Attacks Focus on Just Three TCP Ports

0
Small to medium-sized enterprises can prevent most cyber attacks by defending the ports which the actors most endanger. Three of them stand out in...
Grandcrab Ransomware

GandCrab Ransomware Free Decryption Tool released by Bitdefender Recover Files without paying (2019)

0
Recent decryption update allows victims infected with GandCrab to recover files from November 2018 to February 2019 without paying the ransom demand. The Bitdefender team...
Social Engineering Forum

Social Engineering Forum Hacked, Leak Data Shared

0
A social engineering forum was infringed about two weeks ago and on the same day of the hack, the data of tens of thousands...
honda data breach

Honda’s network security risks – Unsecured database Exposed

0
A publicly available ElasticSearch database exposed an enormous amount of information on the global automotive giant Honda internal network, showing potential security vulnerabilities which...
Hacker use google cloud

Hackers Use Google Cloud Computing Platform to deliver target malware attacks via PDF

0
Hackers have launched a worldwide malware campaign using the Google cloud computing platform via armed PDF. Security researchers at the Netskope Threat Research Labs have...
Pirate Bay down 2019

The Pirate Bay (TPB) malware: A hotspot for downloading a new spyware Trojan

0
For adware programs and tools, PirateMatryoshka is described as a "Russian doll." The Pirate Bay (TPB) has become a hotspot for downloading a new...
Linux malware

SpeakUp – New Linux backdoor Trojan Discovered by Security Experts

0
SpeakUp Trojan backdoor can run on six different Linux and macOS distributions. The hackers have developed a new Trojan backdoor which can run on Linux...
Microsoft-created cloud computing platform

Hackers abuse Microsoft Azure to use malware and evasion technology on C2 servers

0
Now, Microsoft Azure is a sweet spot for hackers to host powerful malware and also to send and receive a command to affected systems...
Mobile Hacking Firm Cellebrite

New Premium Tool for Mobile Hacking Firm Cellebrite can Hack & Extract Data from...

0
Israel's forensic firm and well-known law enforcement agent, Cellebrite published a public statement that iOS and high-end Android devices can be hacked to law...
SMS containing malicious links

Latest Android Ransomware – Spread SMS containing malicious links to Infect Its Victims

0
A new Android device target ransomware family spreads to other victim by sending text messages with malicious links throughout the contact list of already...