Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Vulnerability Management
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Blog
Latest Posts
Ongoing phishing campaign targets UN humanitarian organizations
The campaign uses several noteworthy techniques, including the ability to detect mobile devices and to log keystrokes.
25 October 2019
New Gustuff malware campaign uses Instagram to infect users with Android banking trojan
Gustuff Android banking trojan returns with new features, moves to new distribution hosts.
24 October 2019
Magecart Group 5 linked to Dridex banking Trojan, Carbanak cybercrime gang
Researchers identified registrant data that is connected to Magecart Group 5, Dridex phishing campaigns and the Carbanak group.
23 October 2019
Chinese hackers target MSSQL Servers with a new backdoor
The Skip-2.0 backdoor allows the attacker to gain persistence in the victim's MSSQL while remaining undetected.
22 October 2019
Hackers use fake UpdraftPlus plugins to backdoor WordPress websites
The malicious plugins hide themselves in the WordPress dashboard from anyone who doesn’t use browsers with specific User-Agent strings.
21 October 2019
1
2
...
665
666
667
668
669
...
709
710
Popular Posts
Cyber Security Week in Review: June 20, 2025
Russian crypto executive sentenced to prison in US for market manipulation scheme
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US
Featured vulnerabilities
Denial of service in pure-ftpd
Medium
Patched
|
21 Jun, 2025
Information disclosure in Python Requests library
Medium
Patched
|
21 Jun, 2025
Multiple vulnerabilities in sslh
Medium
Patched
|
21 Jun, 2025
Dell Container Storage Modules update for ingress-nginx
Сritical
Patched
|
20 Jun, 2025
Cross-site request forgery in 4stats plugin for WordPress
Low
Patched
|
20 Jun, 2025