A new malware family has been discovered by threat researchers that is fully focused on acquiring the maximum amount of cryptocurrency possible from its victims. For this purpose, it steals wallets, hijacks transactions, and starts mining on inf... Read more
Hacking is made easier than it would otherwise have been, due to a popular penetration testing tool called Metasploit. Offering a broad platform for pen-testing and exploit development, the Metasploit Framework has a suite of extensively used to... Read more
Recently a spammer group has started to execute a clever trick that has helped them to bypass email filters and security systems, landing them in more than the usual numbers of inboxes. The trick relies on a quirk in RFC791 — a standard that des... Read more
The .ABCD virus that was first discovered in September 2019 has been updated with several new features and is now a Ransomware-as-a-Service (RaaS) called LockBit. a new data leak website was launched by the attackers behind this ransomware and t... Read more
Armed with an undetectable strand of malware, attackers are targeting misconfigured cloud-based docker instances running on Linux distributions. The malware strand that is dubbed as Doki is a part of Ngrok Cryptominer Botnet campaign that has be... Read more