Security News

A recently discovered backdoor can spread itself over a local network, in addition to allowing attackers to install additional malware onto compromised machines. read more

Researchers have detected a new campaign against the hotel-entertainment industry employing the first documented use of the ShellTea/PunchBuggy backdoor since 2017. It is also thought to be the...

The cyber-espionage group known as MuddyWater has used an updated multi-stage PowerShell backdoor in recent campaigns, Trend Micro’s security researchers report. read more

Are you using Komodo's Agama Wallet to store your KMD and BTC cryptocurrencies? Were your funds also unauthorisedly transferred overnight to a new address? If yes, don't worry, it's probably safe,...

The Open Technology Institute (OTI) has responded to GCHQ/NCSC's article on 'Principles for a More Informed Exceptional Access Debate' with an 'Open Letter to GCHQ on the Threats Posed by the...

A commercial phishing platform that targets Apple users has proven popular enough for other criminals to pirate, though the pirated version transmits harvested data through a hidden back channel.

The BlackTech cyber-espionage group has been performing man-in-the-middle (MitM) attacks on the update process of the ASUS WebStorage application to deliver the Plead backdoor to their targeted...

Researchers have discovered a severe vulnerability in Cisco products that could allow attackers to implant persistent backdoor on wide range devices used in enterprises and government networks,...

Here’s an overview of some of last week’s most interesting news and articles: Android Q: Enhanced security for consumers and enterprises The upcoming, newest version of Android – still only known...

Turla Cyber Espionage Group's 5-Year Campaign Hit Three Targets, ESET WarnsA sophisticated nation-state spy network has quietly exploited a backdoor in Microsoft Exchange servers that gave...