Charger Android Ransomware Reaches Google Play Store

Google has removed an app from the Play Store that contained a new Android ransomware family…

Trojan Transforms Linux Devices into Proxies for Malicious Traffic

Security researchers have uncovered a new trojan that targets Linux devices that is capable of transforming…

Meet TorWorld, an Upcoming Tor-as-a-Service Portal

TorWorld project wants to teach you about Tor and become a hosting provider for Tor nodes.…

What your security scientists can learn from your data scientists to improve cybersecurity

 Security remains one of the top unresolved challenges for businesses. Billions of dollars have been spent…

A Benevolent Hacker Is Warning Owners of Unsecured Cassandra Databases

An unknown hacker is accessing public and unsecured Apache Cassandra databases and adding an extra table…

Linux Systemd Flaw Gives Attackers Root Access

Security researcher Sebastian Krahmer has recently discovered that a previously known security flaw in the systemd…

Bug Allowed Access to Over 218K Private Messages on Dark Web Marketplace AlphaBay

AlphaBay admins announced today they've plugged a security hole that allowed an attacker to gain access…

Secret Double Octopus nabs $6M for a stronger, easier alternative to regular 2FA

 Israel is home to around 450 active startups in the field of cybersecurity, according to a…