CyberStalkers – Risks and problems these brings to us
Social networks are tools that promote contact between individuals from all parts of the world. However, it is more and more frequent that crimes are committed through these means, the…
Cloud Server and Hosting Tutorials, News and Tricks
Social networks are tools that promote contact between individuals from all parts of the world. However, it is more and more frequent that crimes are committed through these means, the…
Researchers at Microsoft Security Intelligence discovered a malware campaign that is spreading a Remote Access Trojan (RAT) registered as STRRAT. The RAT was designed to steal data from victims while…
An ongoing malware campaign has been discovered that uses the AutoHotkey (AHK) scripting language to deliver multiple RATs, such as LimeRAT, AsyncRAT, Houdini, Vjw0rm, and Revenge RAT. This campaign is…
Cybercriminals are putting more and more effort and creativity into carrying out attacks. Therefore, they prefer much more attractive targets such as organizations. Advanced Persistent Threats (APT) are proof of…
A newly discovered cyberattack is taking control of victims’ Gmail accounts by using a malicious and custom Mozilla Firefox browser extension called FriarFox. Experts in the area claim that this…
Tox is a kit for creating ransomware viruses therefore almost anyone can generate a fully functional ransomware infection. The worst thing about this is that the cybercriminals responsible for launching…
Operating systems, web browsers, and even our Internet provider are constantly monitoring our activity. The companies behind it often collect usage information, sometimes anonymous and sometimes not so, that is…
A major cyberattack that hit the US pharmacy GenRx potentially resulted in a data breach. The incident affected hundreds of thousands of patients exposing their health data. Specifically, the service…
Cybersecurity researchers have discovered that a decade-old botnet has a new feature that allows it to send millions of phishing emails, specifically sextortion threats from a single hijacked PC. The…
SQL, which have been around for a long time. Today, they continue to be widely used by cybercriminals. The purpose of these attacks is to compromise the servers targeted by…