Chinese APT Hackers “Mustang Panda” Attack Public & Private Sectors Using Weaponized PDF and Word Documents

Chinese APT Hackers “Mustang Panda” Attack Public & Private Sectors Using Weaponized PDF and...

Researchers discovered an ongoing malware campaign that believed to be operating by a Chinese based threat group called "Mustang Panda" that targets...
Odix – An Enterprise-Grade File-Based Cyber Attack and Malware Protection to SMBs

Odix – An Enterprise-Grade File-Based Cyber Attack and Malware Protection to SMBs

Cybersecurity solutions provider odix has set its sights on bringing enterprise-grade cybersecurity to small to medium businesses (SMBs). The company specializes in...
buggy malware

Buggy Malware Attack on WordPress Websites by Exploiting Newly Discovered Theme & Plugin...

Researchers discovered an ongoing buggy malware campaign that attempts to exploit the newly discovered vulnerabilities resides in the WordPress theme and plugin.
PKPLUG

PKPLUG -New Research Found Same Chinese Hacking Group Involved with Multiple Cyber Attacks Across...

Researchers linked multiple Cyber-espionage campaigns across Asia to the threat actor group PKPLUG. The group uses its PlugX malware and the number...
Turla APT Hackers Using New Malware to Break The TLS Encrypted Web Traffic Communication

Turla APT Hackers Using New Malware to Break The TLS Encrypted Web Traffic Communication

Turla APT threat actors distribute a new malware called Reductor, a successor of COMpfun to compromise the TLS encrypted web traffic and...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security