News

Home News Page 18
News.

Trojan found lurking in a fake TeamViewer executable file

Source: Cyware | By Ryan Stewart • A malicious URL discovered by a security researcher is believed to be a Trojan disguising as a TeamViewer...

Cybercriminals exploit ThinkPHP vulnerability via Hakai and Yowai botnets

Source: Cyware | By Ryan Stewart • ThinkPHP vulnerability is being increasingly exploited for botnet propagation by Mirai variant Yowai and Gafgyt variant Hakai. • Attackers...

Voicemail phishing campaign targets users’ login credentials

Source: Cyware | By Ryan Stewart • A new phishing campaign pretending to be a voice delivery notification from RingCentral tricks users into entering their...

New Ransomware strain ‘hAnt’ targets Bitcoin mining rigs

• The infected mining rigs include Antminer S9 and T9 devices used for Bitcoin mining and Antminer L3 rigs used for Litecoin mining. • Security...

Cybersecurity Threats and Vulnerabilty trends in APAC for 2019

Skybox Security: Cybersecurity Threats and Vulnerabilty trends in APAC for 2019 2018 has been another transformative time for security teams in APAC regions. The imposition...

Check Point Launches Maestro, Hyperscale Network Security Solution

Check Point Launches Maestro, the Industry's First Hyperscale Network Security Solution, and New Ultra-scalable Gateways Check Point Software Technologies has introduced Check Point Maestro, the...

Security Report Shows 37% of Organizations Impacted by Cryptomining

Check Point's 2019 Security Report Shows 37% of Organizations Impacted by Cryptomining Check Point Software Technologies has published the first instalment of its 2019 Security...

Check Point Introduces Industry-first Hyperscale Network Security at CPX360

Check Point Introduces Industry-first Hyperscale Network Security at CPX360, the Premier Annual Gathering of Security Leaders Check Point Software Technologies kicked off its annual customer...

New variant of RogueRobin trojan uses DNS tunneling

Source: Cyware | By Ryan Stewart New variant of RogueRobin trojan uses DNS tunneling to communicate with C2 server • The infamous DarkHydrus threat actor group...

Malicious websites could exploit Extension APIs to grab browser data

Source: Cyware | By Ryan Stewart • APIs for 197 browser extensions are under the scanner for security issues, said a researcher. • Along with making...
- Advertisement -