You might be interested in …

[ThreatPost] Microsoft, Adobe Exploits Top List of Crooks’ Wish List

All posts, ThreatPost

You can’t possibly patch all CVEs, so focus on the exploits crooks are willing to pay for, as tracked in a study of the underground exploit market. Source: Read More (Threatpost)

Read More

[SecurityWeek] BillQuick Billing Software Exploited to Hack U.S. Engineering Company

All posts, Security Week

Hackers abused the BillQuick Web Suite billing software to compromise the network of an engineering company in the United States and deploy ransomware, threat detection firm Huntress reports. read more Source: Read More (SecurityWeek RSS Feed)

Read More

[HackerNews] Another Set of Joker Trojan-Laced Android Apps Resurfaces on Google Play Store

All posts, HackerNews

A new set of trojanized apps spread via the Google Play Store has been observed distributing the notorious Joker malware on compromised Android devices. Joker, a repeat offender, refers to a class of harmful apps that are used for billing and SMS fraud, while also performing a number of actions of a malicious hacker’s choice, such as […]

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.