Google has removed an app from the Play Store that contained a new Android ransomware family…
Category: Security
Trojan Transforms Linux Devices into Proxies for Malicious Traffic
Security researchers have uncovered a new trojan that targets Linux devices that is capable of transforming…
Meet TorWorld, an Upcoming Tor-as-a-Service Portal
TorWorld project wants to teach you about Tor and become a hosting provider for Tor nodes.…
What your security scientists can learn from your data scientists to improve cybersecurity
Security remains one of the top unresolved challenges for businesses. Billions of dollars have been spent…
A Benevolent Hacker Is Warning Owners of Unsecured Cassandra Databases
An unknown hacker is accessing public and unsecured Apache Cassandra databases and adding an extra table…
Linux Systemd Flaw Gives Attackers Root Access
Security researcher Sebastian Krahmer has recently discovered that a previously known security flaw in the systemd…
Bug Allowed Access to Over 218K Private Messages on Dark Web Marketplace AlphaBay
AlphaBay admins announced today they've plugged a security hole that allowed an attacker to gain access…
Secret Double Octopus nabs $6M for a stronger, easier alternative to regular 2FA
Israel is home to around 450 active startups in the field of cybersecurity, according to a…