New research explores the similarities of three illicit mining cybercrime groups that are known to compromise enterprise services in order to install miners. Combined, these three groups have generated approximately 1,200 Monero coins, […]
Exploit code has been published for a local file inclusion (LFI) type of vulnerability affecting the Console plugin in Kibana data visualization tool for Elasticsearch; an attacker could use this to upload a malicious script and potentially get remote code execution....
These extortion emails are getting wilder and wilder. First we had the sextortion scams that threatened to reveal victims doing dirty deeds, then bomb threats, which brought the attention of law enforcement worldwide, and now we have threats that a hitman is targeting...
Windows 10’s next update codenamed ’19H1′ will reportedly come with Microsoft Flow-powered custom actions for the Action Center, independent dark theme toggle for File Explorer, new Task Manager feature and more. […]
Four drivers from ASUS and GIGABYTE come with several vulnerabilities that can be leveraged by an attacker to gain higher permissions on the system and to execute arbitrary code. […]
Security researchers have found a way to corrupt the firmware of a critical component usually found in servers to turn the systems into an unbootable hardware assembly. The recovery procedure requires physical intervention to replace the malicious firmware....