Skip to content
  • Home

CYBRNOW

  • What the Hack
    • Cyber Attack
    • Data Theft
    • Zero-Day Attack
  • Technology
    • Internet
    • Software
  • Vulnerability
    • Zero-Day Vulnerability
  • Threat
    • Malware
    • Ransomware
    • APT
    • Phishing
    • Threat Operation
most vulnerable OS of 2017

10 Most Vulnerable OS Of The Year 2017

WhiteBear APT Campaign

WhiteBear APT Campaign Spying Embassies and Consulates

Nigerian Hacker

Tale of a Nigerian Hacker and 4,000 Organisations in his Target List

Filecoder Ransomware for MACOS

Filecoder – This Ransomware Spreading Through The Torrent Websites Targets Mac Users.

Operation BugDrop

#OperationBugDrop. Ukrainian Media & Scientist’s Microphone Hijacked. 600GB Data Exfiltrated

Gmail blocks JavaScript attachments

Gmail starts blocking JavaScript attachments, A Setback To The Hackers

Author: Rumi

WhiteBear APT Campaign

WhiteBear APT Campaign Spying Embassies and Consulates

The security researchers at Kaspersky revealed an APT backdoor campaign that has been used to spy on consulates and embassies worldwide. The researchers have coined the term WhiteBear for the […]

September 4, 2017September 4, 2017 Rumi APT, Threat Campaign
Filecoder Ransomware for MACOS

Filecoder – This Ransomware Spreading Through The Torrent Websites Targets Mac Users.

A new form of crypto-ransomware for MacOS has been discovered in the wild that makes it impossible for the victim to recover the data even after they pay up. The […]

February 23, 2017March 20, 2017 Rumi Ransomware, Threat
Operation BugDrop

#OperationBugDrop. Ukrainian Media & Scientist’s Microphone Hijacked. 600GB Data Exfiltrated

#BugDrop. An advanced malware-based operation has been uncovered that ex-filtrated over 600 GB data from about 70 targets in Ukraine. The malicious operation targeted Ukraine’s various sectors including critical infrastructure, […]

February 21, 2017February 21, 2017 Rumi Cyber Espionage, What the Hack
Gmail blocks JavaScript attachments

Gmail starts blocking JavaScript attachments, A Setback To The Hackers

Gmail starts blocking JavaScript attachments. From Feb 13th, 2017, Gmail has started deploying their new restrictive policy on .js file attachments and extended their list of file types blocked for […]

February 17, 2017February 17, 2017 Rumi Software, Technology
fake adobe flash player

Android Users Targeted By A New Malicious App Faking As Adobe Flash Player

Android users have been exposed to a new malicious app faking as Adobe Flash Player. The fake app later creates malicious “Saving battery” service and serves as an entry point […]

February 14, 2017February 15, 2017 Rumi Threat
Ratankba malware watering hole

This Group Attacked Over 100 Financial Organizations Across 31 Countries With “Watering Hole” Technique

The security researchers at Symantec revealed the cyber criminal group and the attack vector that attacked over 100 organizations in 31 different countries. The researchers believe that recent cyber attacks […]

February 13, 2017February 13, 2017 Rumi Threat
MHA Website Hacked

India’s Ministry of Home Affairs Website Taken Down After Cyber Attack, Investigation Continues

The Ministry of Home affairs website has been taken down after it was reportedly hacked by an anonymous hacker. The website will temporarily remain unreachable from the internet, an official confirmed. […]

February 12, 2017February 12, 2017 Rumi Cyber Attack, What the Hack
Indian Govt Website Hacked

Its Official, Over 700 Indian Govt Websites Hacked between 2013 and 2016, Over 8000 Suspects Arrested

More than 700 websites of Indian ministry and state government were hacked between 2013 and 2016. This information was shared with Indian Parliament by the Minister of state for home Hansraj […]

February 10, 2017February 10, 2017 Rumi What the Hack
macro based malware

Alert! For The First Time, Macros Based Malware Targeting Apple Computers

Malware that exploits macro-enabled Office documents has been terribly common across Windows users. After turning into a common prevalence on Windows-based computers over the past few years, such malware is […]

February 9, 2017 Rumi Threat
HackerOne Funding

Hackers, Are You Ready? HackerOne Raises $40 Million To Widen The Bug Bounty Platform

HackerOne, today announced $40 million funding in Series C investment round. With more cash on the balance sheet, HackerOne plans to focus on widening the bug bounty platform. Created by […]

February 8, 2017February 8, 2017 Rumi Technology

Posts navigation

Older posts
Connect with us
Connect with us
Most Recent
  • most vulnerable OS of 2017

    10 Most Vulnerable OS Of The Year 2017

  • WhiteBear APT Campaign

    WhiteBear APT Campaign Spying Embassies and Consulates

  • Nigerian Hacker

    Tale of a Nigerian Hacker and 4,000 Organisations in his Target List

  • Filecoder Ransomware for MACOS

    Filecoder – This Ransomware Spreading Through The Torrent Websites Targets Mac Users.

  • Operation BugDrop

    #OperationBugDrop. Ukrainian Media & Scientist’s Microphone Hijacked. 600GB Data Exfiltrated

Most Popular
  • 10 Most Vulnerable OS Of The Year 201710 Most Vulnerable OS Of The Year 2017
  • 10 Most Vulnerable OS Of The Year 201610 Most Vulnerable OS Of The Year 2016
  • Switcher Android Trojan Hacks TP-Link RoutersSwitcher Android Trojan Hacks TP-Link Routers
  • Indian Hackers Crackdown Facebook Groups Dealing With Online Sex RacketsIndian Hackers Crackdown Facebook Groups Dealing…
  • Tale of a Nigerian Hacker and 4,000 Organisations in his Target ListTale of a Nigerian Hacker and 4,000 Organisations in…
CYBRNOW.COM © All Rights Reserved. 2016-2017.