Astaroth Trojan

Astaroth Trojan Disguises as JPEG, GIF File Abuses OS and Antivirus Process to Steal...

A new unique campaign abuses system native OS process and security software to steal passwords and personal information. Threat actors disguise the Astaroth Trojan payload as JPEG, GIF, and extensionless to avoid file detections.
Microsoft Store

For the First Time, Cryptojacking Apps is Found on Microsoft Store

Eight crypto jacking apps found on the Microsoft Store tha abuses victim's CPU cycle to mine Monero without user knowledge. Symantec detected the malicious apps on Microsoft Store disguised as the apps for computer...
127 million

Hacker Who Stole 620 Million Records has Stolen Another 127 Million Records from Another...

A new report reveals that the hacker who stoles 620 million user data from 16 popular websites have stolen another 127 million data from another 8 websites. The hacker listed the data on the...

500px Hacked – Attackers Stolen 14.8 Million Users Personal Data

500px , an online photography community suffering a massive data breach that leaked 14.8 million users personal information by cybercriminals. 500px global network for photographers and the platform managing around 16 million users...
Data Manipulation Attacks

Data Manipulation Attacks – Steps to Protect and Mitigate Your Network

Programmers don't generally take data. Now and again the objective is to control the data to trigger outside occasions that can be exploited purposefully. The standard way of thinking says that once an...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended