Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Vulnerability Management
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Blog
Latest Posts
Extensive hacking operation discovered in Kazakhstan
The target list included individuals and organizations operating in various sectors, including government agencies, military personnel, and foreign diplomats.
25 November 2019
Gnip mobile banking trojan is actively evolving into a dangerous threat
The latest malware variant comes with an impressive set of functions, including two-screen overlay approach to impersonate banks.
22 November 2019
New P2P Roboto botnet enslaves Linux Webmin servers
Despite the implementation of DDoS functionality, it seems that botnet's operators so far are not interested in launching DDoS attacks.
21 November 2019
New Phoenix keylogger attempts to stop over 80 anti-malware tools to evade detection
Phoenix operates under a malware-as-a-service model and already has targeted victims across the world.
20 November 2019
A new multi-platform backdoor targets both Windows and Linux systems
The backdoor allows the attackers to gather sensitive information the compromised machines.
19 November 2019
1
2
...
664
665
666
667
668
...
712
713
Popular Posts
Cyber Security Week in Review: June 27, 2025
OneClik cyber-espionage campaign targeting energy, oil and gas infrastructure
Ransomware attack contributed to patient's death at London NHS Trust
Featured vulnerabilities
Privilege escalation in PowerVR GPU DDK
Low
Patched
|
28 Jun, 2025
Multiple vulnerabilities in ESRI ArcGIS
Low
Patched
|
28 Jun, 2025
Path traversal in ESRI ArcGIS
Low
Patched
|
28 Jun, 2025
Inclusion of sensitive information into log files in RabbitMQ
Low
Patched
|
27 Jun, 2025
Arbitrary code execution in File::Find::Rule
Low
Not Patched
|
27 Jun, 2025