GlowWorm new method of spying
Researchers at Ben-Gurion University of the Negev have demonstrated a novel way to spy on electronic conversations called Glowworm, which…
BlackMatter new threat group emerges
As many of us know, cybercriminal groups are always active and that new groups emerge it is not surprising, this…
RansomExx – another Ransom attacks companies
Ransomware has always been in constant activity by cybercriminals since they are a very effective method against wealthy companies and…
IoT attacks – The most notorious ones up to today
With the increase in global trust in the internet, Internet of Things devices are also making their way into all…
GhostEmperor group that targets high profile users
As we well know, cyber threat campaigns do not stop and today we will see one that is in full…
LeetSpeak really complex programming language
Along the same lines of hiding the original message, for several years now, groups of elitist people began to appear…
LemonDuck returns to exploit Vulnerabilities
The return of the LemonDuck malware reminds us that there is no such phenomenon as permanently eradicating a vulnerability. In…
FatalRAT – Trojan that spreads via Telegram
AT&T Alien Labs has published a report that provides details of the new FatalRAT Trojan circulating online that aims to…
Zoombombing is a rather annoying practice
The period of isolation during the quarantine has forced us to rely on remote communication technology to keep in touch.…
CMS – How these content managers work
The world has never been as connected as it is today. The current consumer scenario involves devices of all kinds,…

