The North Korean cyber-espionage group known as the Lazarus Group has been busy hacking US defense contractors, according to a report published on Monday by security research firm Palo Alto Networks.
Today a new Locky Ransomware variant was discovered that switches to the .lukitus extension for encrypted files. It is not currently known how this variant is being distributed, but as the ransomware is being downloaded from a remote site it is most likely malspam.
A new ransomware called SyncCrypt was discovered that is being distributed by spam attachments pretending to be court orders. This ransomware uses a interesting approach of embedding a zip file in a jpg image in order to avoid detection.
Episode 6 of Game of Thrones season 7 has leaked online on streaming, torrent, and file-sharing portals after HBO accidentally broadcast the episode via its on-demand streaming platform.
Today's we have a pay what you want deal for 9 courses with 148+ hours of training on learning how to pentest, analyze networks for weaknesses, and program in various languages. This deal has a combined value of $1,431, but with the Pay What You Want bundles, you are able to get all of the courses by beating the average price.
A group with possible links to Chinese hackers has managed to break into the servers of NetSarang — a South Korean software maker — and has hidden a backdoor in the company's software packages.
One lone hacker operating out of Lagos, Nigeria was able to hack into over 4,000 organizations across the globe using basic techniques and antiquated tools, according to an investigation by researchers at Check Point.
Six more developers have had their Chrome extensions hijacked in the past four months, according to new evidence surfaced yesterday by Proofpoint researcher Kafeine.
A PHP ransomware project open-sourced on GitHub is still spawning active threats, more than a year after it was released in early 2016.
The Daily Stormer, the most well known of all white supremacy online portals, was forced to move today to the Dark Web after various service providers dropped the site from their infrastructure.
An Internet-wide scan carried out by security researchers from Rapid7 has discovered over 11 million devices with 3389/TCP ports left open online, of which over 4.1 million are specifically speaking the RDP protocol.