In the fiscal year 2020, a risk evaluation of 37 attack strategies has been performed by the Cybersecurity and Infrastructure Security Agency (CISA) in several sectors. Six sequential infection stages were mapped to these tactics using the MITRE... Read more
The Trickbot malware has now added Zeus flavor to their modules. It has lately been noticed being plugged to the New Virtual Network Computing (VNC) module recently, helping an actor to watch and collect high-profile targets. Trickbot’s recent u... Read more
Ransomware gang is using a Linux variation to maximize damage on VMware’s virtual machine platform behind the well-popularized attack on CD Projekt Red. As the organizations advance more and more towards virtual machinery, ransom... Read more
Mint Mobile has reported a violation of their security and a breach of data after an unauthorized individual obtained access to their patron’s account details and ported their telephone numbers to another carrier. According to the warning of inf... Read more
In order to fix a zero-day critical weakness in the Windows Print Spooler service, Microsoft issued an emergency Windows patch. It could allow hackers to get system rights on affected PCs. What Transpired? Only after security researchers have un... Read more