Loapi trojan – “jack of all trades”
Researchers at Kaspersky Labs have discovered a new Android Trojan dubbed Loapi that has a modular architecture designed to conduct multiple malicious activities.
Loapi trojan – “jack of all trades” Read More »
Researchers at Kaspersky Labs have discovered a new Android Trojan dubbed Loapi that has a modular architecture designed to conduct multiple malicious activities.
Loapi trojan – “jack of all trades” Read More »
Google Project Zero researcher Tavis Ormandy discovered a password manager dubbed “Keeper” that comes pre-installed by default with a vulnerability in new Windows 10 Anniversary Update (Version 1607).
Keeper password manager vulnerability Read More »
FireEye’s Mandiant spotted new malware called Triton that has targeted a critical infrastructure organization. FireEye discovered the new threat as part of a recent incident response investigation for one if its customers.
Triton malware attacks critical industrial control systems Read More »
US-CERT and the CERT Coordination Center (CERT/CC) issued a security advisory on a Transport Layer Security (TLS) vulnerability dubbed “ROBOT”.
ROBOT TLS Vulnerability Read More »
A new hacking group dubbed MoneyTaker has stolen allegedly millions of dollars from banking institutions from US, UK and Russia over the past year, according to researchers.
MoneyTaker hacking group Read More »
McAfee observed an increase in activity in a Trojan downloader dubbed “Emotet” that spreads by emails used to trick victims into downloading a number of malicious payloads to include ransomware, Dridex, Trickbot, Pinkslipbot, and other banking Trojans.
Emotet downloader trojan Read More »
The Open Web Application Security Project (OWASP) released the OWASP Top 10 – 2017. The new standard includes the ten most critical web application security risks. This is the first update since the 2013 version.
OWASP Top 10 2017 Web Application Security Risks: What’s Changed? Read More »
Researchers from the University of Birmingham have discovered certain banking iOS and Android apps, such as HSBCand the TunnelBear VPN app, are vulnerable to man-in-the-middle (MITM) attacks.
MITM attacks on banking apps Read More »
NiceHash, a Bitcoin mining market and exchange company, reported it was a victim of a data breach and planned to suspend operations for 24 hours.
NiceHash security breach Read More »
A new vulnerability in TeamViewer remote support software could allow an attacker to gain control of presenter’s or viewer’s session without permission.
TeamViewer permissions bug Read More »