CroniX CryptoMiner Kills Rivals to Reign Supreme

The operator of a new cryptomining campaign takes aggressive actions against its competition and halts other…

Cisco Releases 16 Security Alerts Rated Critical and High

Cisco published on Wednesday 30 security advisories on vulnerabilities identified in its products. Half of them…

Windows Task Scheduler Zero Day Exploited by Malware

Malware developers have started to use the zero-day exploit for Windows Task Scheduler component, two days…

USA Is the Top Country for Hosting Malicious Domains According to Report

The US continues to be the top country hosting domains that serve web-based threats and, and…

White-Hats Go Rogue, Attack Financial Institutions

Hackers rooted in the white-hat part of the business moonlight as bank robbers, pouring their knowledge…

Python Package Installation Can Trigger Malicious Code

Although there is nothing special about code executing on a machine, when this code is executed…

New Banking Trojan Poses As A Security Module

A newly discovered banking Trojan departs from the regular tactics observed by malware researchers by choosing…

Thousands of Compromised MikroTik Routers Send Traffic to Attackers

Attackers compromising MikroTik routers have configured the devices to forward network traffic to a handful of…