Reverse Shell vs. Backdoor : What is the Differences?
Backdoor and Reverse Shell are very similar, which may lead you to believe they are the same thing. But take your time with conclusions on this point; we have given…
Azov Ransomware Tries to Set Up Cybersecurity Specialists
Azov ransomware, a newcomer to the encryption malware market, appears in view with a rather unusual strategy. This malware seems to be a simple vandal that shifts responsibility to honorable…
Raspberry Robin Worm Operators Now Trade Access
Microsoft researchers reported that the operators of the hack group, which they track under the ID DEV-0950, used the Clop ransomware to encrypt the network of a victim previously infected…
How to Stop Spam Calls & Block Unwanted Calls Immediately
Unwanted spam calls, as well as unwanted emails, often come from fraudsters. There are cases when these emails or calls come from companies or stores where you have recently made…
The Updated Fodcha Botnet Reaches a Capacity of 1 Tb / s and Demands a Ransom Directly in DDoS Packets
Qihoo 360 (360 Netlab) experts have warned about the emergence of an updated version of the Fodcha botnet, which embeds ransom demands directly into DDoS packets and has new infrastructure…
OpenSSL Fixes First Critical Vulnerability Since 2016
The developers of the OpenSSL project have informed users that the upcoming version 3.0.7 will close a recently discovered critical vulnerability. This is only the second critical bug in OpenSSL…
Microsoft Links Hacker Group Vice Society to Several Ransomware Campaigns
Microsoft experts have published a report on the hacker group Vice Society (aka DEV-0832), which uses ransomware to attack the educational sector in the US and other countries around the…
7 Facebook Marketplace Scams to Watch Out
Facebook Marketplace allows users to buy and sell just about anything. Just like Craigslist and newspapers, it replaced other ways of advertising for items for sale. Buyers can find a…
Hacktivists Stole 100,000 Emails from Atomic Energy Organization of Iran
The Atomic Energy Organization of Iran (AEOI) reported that the mail servers of one of its subsidiaries were hacked. Previously, the hacker group Black Reward published data stolen from the…
Thousands of GitHub Repositories Spread Malware That Is Disguised as Exploits
Experts from the Leiden Institute for Advanced Computer Science have discovered thousands of GitHub repositories with fake PoC exploits for various vulnerabilities that spread malware. It turned out that the…
What is Norton Scam Email? Tips to Protect Yourself
Norton scam email is a tricky phishing campaign that pretends to be an official mailing from Norton. It generally aims at users’ sensitive information, including banking data. Let’s figure out…
Amazon Email Phishing: How to Protect Yourself?
Amazon email phishing is yet another form of email fraud that parasites on the name of a legit company. As the company operates in different industries, hackers forge their messages…