Security News > 2018 > February

Software download site/aggregator MacUpdate has been spotted delivering a new Mac crypto miner to users. A new Mac cryptominer was being distributed from hacked MacUpdate pages yesterday,...

Peter Levashov Allegedly Distributed Spam, Ransomware via Kelihos BotnetRussian citizen Peter Levashov, arrested last year while vacationing in Spain, appeared Friday in U.S. federal court to face...

Lauri Love Wins Appeal, But Faces Prosecution in EnglandLauri Love, a British man accused of 2012 and 2013 hack attacks against U.S. government computers - including systems operated by the...

Researchers have found a new covert data exchange technique that abuses the TLS protocol that can circumvent traditional network perimeter protections.

The botnet uses port scanning code from Mirai, a first for Android-related attacks, according to researchers.


A hacking tool allowing cybercriminals to remotely gain complete control over a victim’s computer is no longer available as a result of an UK-led operation targeting hackers linked to the Remote...

The zero-day Flash Player vulnerability (CVE-2018-4878) that Adobe warned about on Thursday was leveraged by North Korean hackers. FireEye calls the group TEMP.Reaper and Cisco researchers named...

McAfee has discovered an implant that they believe was used as a second-state payload in the recent fileless attacks targeting organizations involved with the upcoming Olympics Games...

Maliciously modified versions of popular applications distributed via the MacUpdate site were observed installing crypto-mining malware on Mac computers, Malwarebytes reports. read more