As various reports from around the world suggest, ransomware is attacks are on the rise. As compared to other forms of malware and due to relatively low execution costs, high rates of return, ransomware has quickly become a preferred method of a... Read more
For their own attacks scores of skilled attackers attempt to use any critical security bug as soon as it is publicized. A new critical security vulnerability with a 10/10 CVSS score, tracked as CVE-2020-1472 and named Zerologon was treated simil... Read more
The normal way of life has been disrupted due to the pandemic, at the same time it has also given rise to various web-phishing attacks. Researchers have discovered that 43% of malicious emails had spyware as attachments or links that led to thei... Read more
A new malware family has been discovered by threat researchers that is fully focused on acquiring the maximum amount of cryptocurrency possible from its victims. For this purpose, it steals wallets, hijacks transactions, and starts mining on inf... Read more
Hacking is made easier than it would otherwise have been, due to a popular penetration testing tool called Metasploit. Offering a broad platform for pen-testing and exploit development, the Metasploit Framework has a suite of extensively used to... Read more