Hackers Now Employ Steganography To WAV Audio Files For Hiding Malware

Despite the presence and implementation of robust security protocols, various persistent and ever-evolving hacking strategies continue to exist. This clearly

Read more

Cryptojacking Apps Removed From Microsoft App Store

After Apple and Google, the malefactors are turning their attention to the Microsoft app store as well. We have already

Read more

New Linux Backdoor “SpeakUp” Found Exploiting Flaws In Multiple Linux Distros

Researchers have discovered a new Trojan campaign that creates a Linux backdoor. Referred to as SpeakUp, the backdoor malware exploits

Read more

Active Exploits Of ThinkPHP Vulnerability Found Even After Patch

In December 2018, we witnessed active exploits of a ThinkPHP vulnerability. After the discoverers of this flaw posted its PoC,

Read more

Mirai Bot Targets Linux Servers Through Hadoop Vulnerability

Mirai Bot, best-known for exploiting IoT Devices has recently been attacking Linux Servers through the Hadoop YARN Vulnerability. Reportedly, many

Read more
Do NOT follow this link or you will be banned from the site!