NatWest, RBS and Ulster Bank Say Online Banking Issue Is Now Resolved

For about five hours this morning NatWest, RBS and Ulster Bank customers were locked out of their accounts the problem

Read more

Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities

CVE Numbers – CVE-2018-15414 and CVE-2018-15421 and CVE-2018-15422 Multiple vulnerabilities in the Cisco Webex Network Recording Player for Advanced Recording

Read more

Kraken Cryptor Ransomware

First observed in August 2018, Kraken Cryptor is a ransomware tool that is delivered to users disguised as a legitimate anti-virus application called SuperAntiSpyware.

Read more

Domestic Kitten Surveillance Campaign

Domestic Kitten is the name given to a spyware campaign which Check Point believes originates from within Iran and has

Read more

BSHARK Launch Hydrogen Powered Drone

BSHARK, an expert on hydrogen-powered drone research, has partnered with MicroMultiCopter (MMC)-a manufacturer of the first hydrogen-powered drone HyDrone 1550.

Read more

Some Kodi Add-ons Contain Malware And Mine Cryptocurrency

A number of add-ons for the media player have apparently been infected by cryptocurrency mining malware that affects Windows and Linux users.

Read more

Cisco Data Center Network Manager Path Traversal Vulnerability [CVE-2018-0464]

CVE Number – CVE-2018-0464 A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to

Read more

Turla Mail Client Backdoor [Turla Outlook Backdoor]

Security researchers have discovered a backdoor tool created by the Turla advanced persistent threat group to target mail clients. The researchers believe that the

Read more

AdvisorsBot Downloader

Security researchers have discovered a new C-based downloader trojan known as AdvisorsBot targeting governmental, telecommunications and leisure organisations. AdvisorsBot is being distributed through

Read more

5 New Apple Security Updates [17-09-2018]

Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to

Read more
%d bloggers like this: