In order to fix a zero-day critical weakness in the Windows Print Spooler service, Microsoft issued an emergency Windows patch. It could allow hackers to get system rights on affected PCs. What Transpired? Only after security researchers have un... Read more
In the underground markets, stealing corporate credentials is a lucrative industry. Threat actors have been discovered to go to great efforts to get them. Another gang of fraudsters has been spotted imitating Adobe online services and luring the... Read more
Cloud computing aims to ensure rapid, convenient, and cost-effective computation and storage of data. However, data confidentiality problems arise in the cloud context. Cryptography is the key method to enhance the security of cloud computi... Read more
Since its first appearance in 2016, the Mirai botnet has been a continual security IoT concern. The malware and its various variations have recently been attributed to the increase in attacks on IoT (55%) and Linux (38%) in the first quarter of... Read more
An ongoing malware campaign was found that predominantly targets military personnel. The spyware campaign has been operating in Dating and Instant Messaging Apps since January. The current version of PJobRAT malware has been discovered, accordin... Read more