Malware & Threats

How Do You Install and Use Vuls for Linux Vulnerability Scanning?
Malware & Threats How Do You Install and Use Vuls for Linux Vulnerability Scanning?

Vuls, a free and open-source vulnerability scanner for Linux, offers a robust solution for scanning networked machines efficiently and effectively. It's specialized for various operating systems, provides multiple scanning methods, and doesn't require the installation of agents on

Is Serbia Using Spyware to Silence Activists and Journalists?
Malware & Threats Is Serbia Using Spyware to Silence Activists and Journalists?

In a startling revelation that has shocked the global community, Amnesty International has uncovered substantial evidence that the Serbian government under President Aleksandar Vucic is using sophisticated surveillance and intimidation tactics to silence activists and journalists who dare to

Novalock Ransomware: How to Remove and Recover Your Encrypted Files
Malware & Threats Novalock Ransomware: How to Remove and Recover Your Encrypted Files

The rising threat of ransomware has reached alarming levels, with Novalock ransomware being a recent example of sophisticated malware that targets and encrypts your valuable files. Belonging to the notorious Globeimposter virus family, Novalock has become a significant concern for both individual

FBI Warns of HiatusRAT Exploiting Web Camera and DVR Vulnerabilities
Malware & Threats FBI Warns of HiatusRAT Exploiting Web Camera and DVR Vulnerabilities

The Federal Bureau of Investigation recently issued a serious warning about the HiatusRAT malware, which has been exploiting vulnerabilities in web cameras and DVR systems. Active since mid-2022, HiatusRAT has primarily targeted high-bandwidth routers, resulting in a significant number of

Are You Prepared for Mail-Based Threats in Your Workplace?
Malware & Threats Are You Prepared for Mail-Based Threats in Your Workplace?

In today's volatile socio-economic and political environment, ensuring the safety of employees and the workplace has become more critical than ever before, especially with the growing threat of mail-based attacks involving dangerous chemicals, explosives, and letter bombs. Recent political

Can UEFI Bootkits Now Threaten Linux Systems With Bootkitty?
Malware & Threats Can UEFI Bootkits Now Threaten Linux Systems With Bootkitty?

The recent identification of Bootkitty, the first UEFI bootkit specifically designed for Linux systems, has taken the cybersecurity industry by storm. For years, UEFI bootkits have primarily targeted Windows environments, but now the threat landscape has expanded to include Linux, thanks to this

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later