Loading...
Skip to content
Trending Now
2 days agoMicrosoft Researchers reveals 3 New Malware Strains Used by SolarWinds Hackers 2 days agoMicrosoft Exchange zero-day exploited in attacks against US local governments 2 days agoDOD’s weapons programs do not have clear cybersecurity guidelines: GAO 3 days agoCybersecurity Firm Qualys Confirms Unauthorized Access to Data Using Accellion hacks 3 days agoCISA issues emergency to Federal Agencies Regarding Microsoft Exchange Flaw
Sunday, Mar 7, 2021
Virtualattacks

It's News About Next Generation Of Cyber Security

Primary Menu
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions

Category: Trends, Reports, Analysis

Microsoft Exchange zero-day exploited in attacks against US local governments
Trends, Reports, Analysis

Microsoft Exchange zero-day exploited in attacks against US local governments

Ongoing investigations into the active use of four Microsoft Exchange bugs has revealed attacks against US local government agencies. On March 2, Microsoft warned that the current risk of zero-days Continue Reading

Posted on: March 5, 2021 By : Priyanshu Vijayvargiya
Hackers ask 500 Bitcoin ransom from Tether
Trends, Reports, Analysis

Hackers ask 500 Bitcoin ransom from Tether

Tether, the issuer of the USDT stablecoin, claims to have received a ransom note asking for 500 bitcoin (currently worth about USD $22 million), lest documents are made public that could “harm the bitcoin Continue Reading

Posted on: March 1, 2021 By : Priyanshu Vijayvargiya
Flash version was distributed in China after EOL installing adware
Trends, Reports, Analysis

Flash version was distributed in China after EOL installing adware

Although the Flash Player app has officially reached its final date on December 31, 2020, Adobe has allowed a local Chinese company to continue distributing Flash within China, where the Continue Reading

Posted on: February 24, 2021 By : Priyanshu Vijayvargiya
Chinese hackers had access to U.S. hacking tools and cloned an attack tool
Trends, Reports, Analysis

Chinese hackers had access to U.S. hacking tools and cloned an attack tool

Chinese threat actors “cloned” and used a Windows zero-day exploit stolen from the NSA’s Equation Group for years before the privilege escalation flaw was patched, researchers say.  On August 13, Continue Reading

Posted on: February 22, 2021 By : Priyanshu Vijayvargiya
Supply chain attacks are on the rise: NCSC warns
Trends, Reports, Analysis

Supply chain attacks are on the rise: NCSC warns

Addressing big business and government agencies, the UK’s National Cyber ​​Security Center (NCSC) has issued a warning that attacks on software pipelines “could have a significant impact.” The compromise of Continue Reading

Posted on: February 16, 2021 By : Priyanshu Vijayvargiya
This malicious Android app hijacked millions of devices after one update
Trends, Reports, Analysis

This malicious Android app hijacked millions of devices after one update

In only one update, the popular barcode scanner app on Google Play has been transformed into malware and has been able to hijack up to 10 million devices. Barcode Scanner Continue Reading

Posted on: February 8, 2021 By : Priyanshu Vijayvargiya
Mozilla will roll out its VPN service in Germany and France in Q1 2021
Trends, Reports, Analysis

Mozilla will roll out its VPN service in Germany and France in Q1 2021

Mozilla is expected to expand its virtual private network (VPN) offering in Germany and France by the end of Q1 2021, which includes the first extension of the service within Continue Reading

Posted on: February 3, 2021 By : Priyanshu Vijayvargiya
Ransom payments are declining as many victims decide not to pay
Trends, Reports, Analysis

Ransom payments are declining as many victims decide not to pay

A high percentage of ransom victims choose to opt-out of pay the ransom amounts but don’t assume that the ransom will go away anytime soon. The ransom rate paid to Continue Reading

Posted on: February 2, 2021 By : Priyanshu Vijayvargiya
FonixCrypter ransomware Shut down and releases the master decryption key
Trends, Reports, Analysis

FonixCrypter ransomware Shut down and releases the master decryption key

The FonixCrypter team said it was closed and removed their ransomware source code. The cybercriminal team behind FonixCrypter ransomware announced today on Twitter that it has removed the ransomware source Continue Reading

Posted on: January 30, 2021 By : Priyanshu Vijayvargiya
Hacker leaks data of MeetMindful dating site
Trends, Reports, Analysis

Hacker leaks data of MeetMindful dating site

The data belongs to the MeetMindful dating site and includes everything from real names to Facebook account tokens and email addresses, and geolocation information. A well-known hacker revealed this week Continue Reading

Posted on: January 24, 2021 By : Priyanshu Vijayvargiya

Posts navigation

Older posts

Categories

  • Breaches and Incidents
  • Companies to Watch
  • Computer, Internet Security
  • Emerging Threats
  • Expert Blogs and Opinion
  • Geopolitical, Terrorism
  • Govt., Critical Infrastructure
  • Identity Theft, Fraud, Scams
  • Incident Response, Learnings
  • Innovation and Research
  • Laws, Policy, Regulations
  • Malware and Vulnerabilities
  • Mobile Security
  • New Cyber Technologies
  • Security Culture
  • Security Tips and Advice
  • Social Media Threats
  • Threat Actors
  • Threat Intel & Info Sharing
  • Trends, Reports, Analysis

Recent Posts

  • Microsoft Researchers reveals 3 New Malware Strains Used by SolarWinds Hackers
  • Microsoft Exchange zero-day exploited in attacks against US local governments
  • DOD’s weapons programs do not have clear cybersecurity guidelines: GAO
  • Cybersecurity Firm Qualys Confirms Unauthorized Access to Data Using Accellion hacks
  • CISA issues emergency to Federal Agencies Regarding Microsoft Exchange Flaw
Virtualattacks
Copyright © 2021 Virtualattacks, Inc. All rights reserved.