Home 2017-08-28T17:57:09+05:30

Critical Security Flaws Identified in CODESYS ICS Automation Software

CODESYS has launched patches to handle as many as 11 safety flaws that, if efficiently exploited, may end in info disclosure and a denial-of-service (DoS) situation, amongst others. The vulnerability [...]

Attackers exploited a zero-day in Mitel VOIP devices to compromise a network

CrowdStrike researchers recently investigated the compromise of a Mitel VOIP appliance as an entry point in a ransomware attack against the network of an organization.  Mitel VOIP Mitel VOIP devices [...]

Dark Web Profile: Netwalker Ransomware

Many ransomware gangs have attempted and failed to quake the cybersecurity landscape. But some have broken through and even rearranged it with their obfuscatory cyberattack methods. Netwalker ransomware is an example of such a [...]

Malicious Windows ‘LNK’ attacks made easy with new Quantum builder

Malware researchers have noticed a new tool that helps cybercriminals build malicious. LNK files to deliver payloads for the initial stages of an attack. Some of the prevalent malware families [...]

Chinese language hackers use ransomware as decoy for cyber espionage

Two Chinese language hacking teams conducting cyber espionage and stealing mental property from Japanese and western firms are deploying ransomware as a decoy. The use of ransomware in espionage operations [...]

Subscribe to our newsletter to receive security tips everday!