The Hacker News — Most Popular Cyber Security, Hacking News Site: Malware

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

August 09, 2018Mohit Kumar
Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attac...
TSMC Chip Maker Blames WannaCry Malware for Production Halt

TSMC Chip Maker Blames WannaCry Malware for Production Halt

August 06, 2018Mohit Kumar
Taiwan Semiconductor Manufacturing Company (TSMC)—the world's largest makers of semiconductors and processors—was forced to shut down ...
Fortnite APK Download for Android Won't Be Available on Google Play Store

Fortnite APK Download for Android Won't Be Available on Google Play Store

August 05, 2018Swati Khandelwal
There's both good news and bad news for Fortnite game lovers. Fortnite, one of the most popular games in the world right now, is co...
iPhone Chip Supplier TSMC Stops Production After Computer Virus Attack

iPhone Chip Supplier TSMC Stops Production After Computer Virus Attack

August 05, 2018Swati Khandelwal
Taiwan Semiconductor Manufacturing Company (TSMC)—Apple's sole supplier of SoC components for iPhones and iPads, and Qualcomm's m...
iPhone Hacking Campaign Using MDM Software Is Broader Than Previously Known

iPhone Hacking Campaign Using MDM Software Is Broader Than Previously Known

July 25, 2018Swati Khandelwal
India-linked highly targeted mobile malware campaign, first unveiled two weeks ago , has been found to be part of a broader campaign targ...
Hackers Used Malicious MDM Solution to Spy On 'Highly Targeted' iPhone Users

Hackers Used Malicious MDM Solution to Spy On 'Highly Targeted' iPhone Users

July 13, 2018Swati Khandelwal
Security researchers have uncovered a "highly targeted" mobile malware campaign that has been operating since August 2015 and f...
Gaza Cybergang Returns With New Attacks On Palestinian Authority

Gaza Cybergang Returns With New Attacks On Palestinian Authority

July 10, 2018Wang Wei
Security researchers from Check Point Threat Intelligence Team have discovered the comeback of an APT (advanced persistent threat) survei...
Stolen D-Link Certificate Used to Digitally Sign Spying Malware

Stolen D-Link Certificate Used to Digitally Sign Spying Malware

July 09, 2018Swati Khandelwal
Digitally signed malware has become much more common in recent years to mask malicious intentions. Security researchers have discover...
Most LokiBot samples in the wild are "hijacked" versions of the original malware

Most LokiBot samples in the wild are "hijacked" versions of the original malware

July 06, 2018Swati Khandelwal
Hacker himself got hacked. It turns out that most samples of the LokiBot malware being distributed in the wild are modified versions of...
New Virus Decides If Your Computer Good for Mining or Ransomware

New Virus Decides If Your Computer Good for Mining or Ransomware

July 05, 2018Mohit Kumar
Security researchers have discovered an interesting piece of malware that infects systems with either a cryptocurrency miner or ransomware...
Github Account of Gentoo Linux Hacked, Code Replaced With Malware

Github Account of Gentoo Linux Hacked, Code Replaced With Malware

June 28, 2018Swati Khandelwal
Downloaded anything from Gentoo's GitHub account yesterday? Consider those files compromised and dump them now—as an unknown group ...
Free Thanatos Ransomware Decryption Tool Released

Free Thanatos Ransomware Decryption Tool Released

June 26, 2018Swati Khandelwal
If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or dec...
New Malware Family Uses Custom UDP Protocol for C&C Communications

New Malware Family Uses Custom UDP Protocol for C&C Communications

June 26, 2018Wang Wei
Security researchers have uncovered a new highly-targeted cyber espionage campaign, which is believed to be associated with a hacking gr...
Python-Based Adware Evolves to Install Malicious Browser Extensions

Python-Based Adware Evolves to Install Malicious Browser Extensions

June 26, 2018Wang Wei
Security researchers have been warning of a few newly detected variants of python -based adware that are being distributed in the wild no...
Magento Hackers Using Simple Evasion Trick to Reinfect Sites With Malware

Magento Hackers Using Simple Evasion Trick to Reinfect Sites With Malware

June 19, 2018Swati Khandelwal
Security researchers have been warning of a new trick that cybercriminals are leveraging to hide their malicious code designed to re-intr...
Hackers Who Hit Winter Olympics 2018 Are Still Alive and Kicking

Hackers Who Hit Winter Olympics 2018 Are Still Alive and Kicking

June 19, 2018Swati Khandelwal
Remember the ' Olympic Destroyer ' cyber attack? The group behind it is still alive, kicking and has now been found targeting b...
Chinese Hackers Carried Out Country-Level Watering Hole Attack

Chinese Hackers Carried Out Country-Level Watering Hole Attack

June 14, 2018Swati Khandelwal
Cybersecurity researchers have uncovered an espionage campaign that has targeted a national data center of an unnamed central Asian country ...
Destructive and MiTM Capabilities of VPNFilter Malware Revealed

Destructive and MiTM Capabilities of VPNFilter Malware Revealed

June 06, 2018Swati Khandelwal
It turns out that the threat of the massive VPNFilter botnet malware that was discovered late last month is beyond what we initially tho...
75% of the 'Left to Get Hacked' Redis Servers Found Infected

75% of the 'Left to Get Hacked' Redis Servers Found Infected

June 04, 2018Wang Wei
Despite the continual emergence of new cyber attacks because of misconfigured servers and applications, people continue to ignore securit...