Threat Profiles

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to...

Auto Clicking “GhostClicker” Playstore Android Adware Found in 340 Apps with 5...

Auto Clicking Android Adware called "GhostClicker" Found in Google Play Store from 340 Android Apps Especially “Aladdin’s Adventure’s World” game which contains same auto...
Netgear R7000 and R6400

Stop using Netgear R7000 and R6400 to Avoid getting Hacked

Netgear R7000 and R6400 and possibly other models may be vulnerable to Injection attacks, which can be exploited by remote attackers to run malicious...
FlawedAmmyy

Hackers Launching FlawedAmmyy Malware Via Undetected MS Excel Macros that Carried Powerful Backdoor

Threat actors from TA505 currently spreading powerful FlawedAmmyy RAT via weaponized MS Excel documents with malicious Excel 4.0 macro which is hard...
Ad Fraud Methbot

Tremendous Ad Fraud ‘Methbot’ : Attackers earn $3-5M Every day

What is Methbot Ad Fraud? Methbot was hosted and controlled by a hacker group in Russia and Operating out with data centres in US and Netherlands. It...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security