by admin | Oct 2, 2020 | Cyber Crime
More often than not, we come across infamous malicious groups who target different victims using the same piece of malware. In such circumstances, the focus is usually on the group and the different evolving versions of their exploits. A recent example is a variant of...
by | Oct 2, 2020 | Malware
Writing advanced malware for a threat actor requires different groups of people with diverse technical expertise to put them all together. But can the code leave enough clues to reveal the person behind it? To this effect, cybersecurity researchers on Friday detailed...
by admin | Sep 28, 2020 | Cyber Attacks
Cybersecurity researchers uncovered fresh evidence of an ongoing cyberespionage campaign against Indian defense units and armed forces personnel at least since 2019 with an aim to steal sensitive information. Dubbed “Operation SideCopy” by Indian...
by admin | Sep 4, 2020 | Security
A team of researchers demonstrated how they hijacked unsecured printers globally while guiding users on how to secure the printers. Unsecured Printers Hijacked Reportedly, the security team at the CyberNews has discovered many vulnerable printers globally. Eventually,...