Top Posts
MKS Instruments falls victim to ransomware attack
Linux Variant of Clop Ransomware Spotted, But Uses...
What web beacons are and how they are...
Major Cybercrime Crackdown: Encrypted Messenger Exclu Seized
Massive ransomware attack targets VMware ESXi servers worldwide
Fortinet unveils custom ASIC to boost firewall performance,...
GuLoader Malware Using Malicious NSIS Executables to Target...
GuLoader Malware Using Malicious NSIS Executable to Target...
OpenSSH Releases Patch for New Pre-Auth Double Free...
OpenAI Rolls Out AI-Text Detection Tool After ChatGPT’s...
Hacking & Cyber Security
  • Home
  • Security
  • Hacking
  • Malware
  • Cyber Crime
  • Cyber Attacks
  • Scams
  • GDPR
Malware

MKS Instruments falls victim to ransomware attack

Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm

What web beacons are and how they are used on websites and...

Major Cybercrime Crackdown: Encrypted Messenger Exclu Seized

Massive ransomware attack targets VMware ESXi servers worldwide

Network SecuritySecurity

Fortinet unveils custom ASIC to boost firewall performance, efficiency

GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce Industry

GuLoader Malware Using Malicious NSIS Executable to Target E-Commerce Industry

OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability

OpenAI Rolls Out AI-Text Detection Tool After ChatGPT’s Popularity

Hacking

Recent legal developments bode well for security researchers, but challenges remain

by January 26, 2023

Despite the hoodie-wearing bad guy image, most hackers are bona fide security researchers protecting…

by January 26, 2023

British Airways suffers frequent flyer account hacking

January 25, 2023
by January 25, 2023

The hacker games that made beating security feel like a thrill

January 25, 2023
by January 25, 2023

Hand implant chip lets hacker attack Android phones via NFC

January 25, 2023
by January 25, 2023

The surprising fees hackers charge for their services

January 25, 2023
by January 25, 2023

Security

What web beacons are and how they are used on websites and in e-mail

February 7, 2023
by February 7, 2023

Fortinet unveils custom ASIC to boost firewall performance, efficiency

February 6, 2023
by February 6, 2023

OpenAI Rolls Out AI-Text Detection Tool After ChatGPT’s Popularity

February 6, 2023
by February 6, 2023

Less is more: Conquer your digital clutter before it conquers you

February 6, 2023
by February 6, 2023

Critical vulnerability patched in Jira Service Management Server and Data Center

February 3, 2023
by February 3, 2023

NTT, Palo Alto partner for managed SASE with AIOps

February 2, 2023
by February 2, 2023

Enterprises turn to single-vendor SASE for ease of manageability

February 2, 2023
by February 2, 2023

ACLU, public defenders push back against Google giving police your mobile data

February 2, 2023
by February 2, 2023

Vulnerability

OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability

by February 6, 2023

Feb 06, 2023Ravie LakshmananAuthentication / Vulnerability The maintainers of OpenSSH have released OpenSSH 9.2…

by February 6, 2023

Hackers Actively Exploiting Zero-Day in Fortra’s GoAnywhere MFT

by February 4, 2023

Feb 04, 2023Ravie LakshmananZero-Day / Vulnerability A zero-day vulnerability affecting Fortra’s GoAnywhere MFT managed…

by February 4, 2023

New High-Severity Vulnerabilities Discovered in Cisco IOx and F5 BIG-IP Products

February 3, 2023
by February 3, 2023

Atlassian’s Jira Software Found Vulnerable to Critical Authentication Vulnerability

February 3, 2023
by February 3, 2023

Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility

February 1, 2023
by February 1, 2023

Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software

February 1, 2023
by February 1, 2023

Cyber Crime

Major Cybercrime Crackdown: Encrypted Messenger Exclu Seized

by February 6, 2023
by February 6, 2023

Dark Web Hitman Paid with BTC to Murder Teen Victim

by February 5, 2023
by February 5, 2023

Doctor Paid $60k in Bitcoin to Hire Dark Web Hitmen

by January 29, 2023
by January 29, 2023

Extradited Alleged ShinyHunters Hacker Pleads Not Guilty in US Court

by January 28, 2023
by January 28, 2023

Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

by January 27, 2023
by January 27, 2023

Blank Images Used to Evade Anti-Malware Check

by January 26, 2023
by January 26, 2023

Security Tools

RootHelper – A Bash Script that Downloads and Unzips Scripts that will Aid with Privilege Escalation on a Linux System – EffectHacking

by admin January 3, 2023

Roothelper will aid in the process of privilege escalation on a Linux system that…

by admin January 3, 2023

SimplyEmail – Email Recon Made Fast and Easy, With a Framework To Build On – EffectHacking

January 3, 2023
by admin January 3, 2023

JShielder – Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer – EffectHacking

January 3, 2023
by admin January 3, 2023

Zizzania – Automated DeAuth Attack – EffectHacking

January 3, 2023
by admin January 3, 2023

dnstwist – Domain Name Permutation Engine for Detecting Typo Squatting, Phishing and Corporate Espionage – EffectHacking

January 3, 2023
by admin January 3, 2023

Latest Posts

  • Malware

    MKS Instruments falls victim to ransomware attack

    by February 7, 2023
    by February 7, 2023

    Semiconductor equipment maker MKS Instruments is investigating a ransomware event that occurred on February…

  • Cyber Attacks

    Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm

    by February 7, 2023
    by February 7, 2023

    Feb 07, 2023Ravie LakshmananEncryption / Linux The first-ever Linux variant of the Clop ransomware…

  • PhishingSecurity

    What web beacons are and how they are used on websites and in e-mail

    by February 7, 2023
    by February 7, 2023

    There is a vast number of trackers, which gather information about users’ activities online.…

  • Cyber Crime

    Major Cybercrime Crackdown: Encrypted Messenger Exclu Seized

    by February 6, 2023
    by February 6, 2023

    So far, authorities have arrested 48 people in connection with Exclu, discovered two drug…

  • Malware

    Massive ransomware attack targets VMware ESXi servers worldwide

    by February 6, 2023
    by February 6, 2023

    A global ransomware attack has targeted thousands of servers running the VMware ESxi hypervisor,…

  • Network SecuritySecurity

    Fortinet unveils custom ASIC to boost firewall performance, efficiency

    by February 6, 2023
    by February 6, 2023

    Fortinet is introducing a new ASIC that promises to meld the security and network…

  • Cyber Attacks

    GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce Industry

    by February 6, 2023
    by February 6, 2023

    Feb 06, 2023Ravie LakshmananCyber Attack / Endpoint Security E-commerce industries in South Korea and…

  • Cyber Attacks

    GuLoader Malware Using Malicious NSIS Executable to Target E-Commerce Industry

    by February 6, 2023
    by February 6, 2023

    Feb 06, 2023Ravie LakshmananCyber Attack / Endpoint Security E-commerce industries in South Korea and…

  • Vulnerability

    OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability

    by February 6, 2023
    by February 6, 2023

    Feb 06, 2023Ravie LakshmananAuthentication / Vulnerability The maintainers of OpenSSH have released OpenSSH 9.2…

  • Security

    OpenAI Rolls Out AI-Text Detection Tool After ChatGPT’s Popularity

    by February 6, 2023
    by February 6, 2023

    As ChatGPT increasingly becomes popular, appearing more of a threat to human writing capabilities,…

Load More Posts

Search

Advertisement

Recent Posts

  • MKS Instruments falls victim to ransomware attack
  • Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm
  • What web beacons are and how they are used on websites and in e-mail
  • Major Cybercrime Crackdown: Encrypted Messenger Exclu Seized
  • Massive ransomware attack targets VMware ESXi servers worldwide

Advertisement

Categories

  • Application Security
  • Broswer Security
  • Cloud Security
  • Cyber Attacks
  • Cyber Crime
  • Data Breach
  • Email Security
  • GDPR
  • Hacking
  • Malware
  • Mobile Security
  • Network Security
  • OS Security
  • Password Security
  • Phishing
  • Physical Security
  • Privacy
  • Scams
  • Security
  • Security Tools
  • Vulnerability

Advertisement

About Us

Viccybersec.com is a multi-platform publisher of news and information.

Viccybersec.com has earned a reputation as the leading provider of service news and information that improves the quality of life of its readers by focusing on hacking & cyber security.

Facebook Twitter Instagram Pinterest Youtube Snapchat

Popular Posts

  • 1

    Researchers Disclose Critical RCE Vulnerability Affecting Quarkus Java Framework

    December 31, 2022
  • 2

    Top tips for security‑ and privacy‑enhancing holiday gifts

    December 31, 2022
  • 3

    Traveling for the holidays? Stay cyber‑safe with these tips

    December 31, 2022

Editor’s Picks

  • MKS Instruments falls victim to ransomware attack

    February 7, 2023
  • Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm

    February 7, 2023
  • What web beacons are and how they are used on websites and in e-mail

    February 7, 2023
  • Home
  • About
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Contact

Ⓒ2023 - All Right Reserved.


Back To Top
Hacking & Cyber Security
  • Home
  • Security
  • Hacking
  • Malware
  • Cyber Crime
  • Cyber Attacks
  • Scams
  • GDPR
Hacking & Cyber Security
  • Home
  • Security
  • Hacking
  • Malware
  • Cyber Crime
  • Cyber Attacks
  • Scams
  • GDPR
Ⓒ2023 - All Right Reserved.