Written By Shane Schick

Zoom Vulnerability Could Let Third Parties Take Over Webcams

A zero-day Zoom vulnerability could allow third parties to snoop on videoconferencing calls, reactivate uninstalled apps and conduct other malicious activities.

Sodinokibi Ransomware Adds Malvertising and More Exploit Kits to Distribution Methods

Sodinokibi ransomware affiliates have added malvertising campaigns to the growing list of attack vectors used to infect victims, according to reports.

TCP SACK Panic Flaw Could Compromise Production Linux Machines

A kernel flaw dubbed TCP SACK Panic could allow remote attackers to compromise organizations running large fleets of production Linux computers, according to a series of security advisories.

InterPlanetary Storm Malware Using IPFS P2P Network to Hide Its Activities

A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.

Latest Mirai Malware Variant Contains 18 Exploits, Focuses on Embedded IoT Devices

Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices.

Windows 10 Zero-Day Lets Threat Actors Bypass Patch and Escalate Role to Admin Level

Threat actors could use a recently discovered Windows 10 zero-day flaw to take over a computer and bypass local privilege escalation.

Maze Ransomware Adjusts Recovery Fee According to Device Type

Security researchers spotted a campaign involving Maze ransomware that is basing the cost of recovering stolen data on the type of device its victim is using.

Hundreds of Thousands of Users Targeted Daily With Would-Be WannaCry Imitators

Two years since the WannaCry attacks wreaked havoc around the world, researchers say hundreds of thousands of people are being targeted with the EternalBlue exploit on which it was based.

Detections of Dharma Ransomware Rise 148 Percent Between February and April 2019

A 13-year-old security threat known as Dharma ransomware is spreading through a variety of distribution methods, leading to a 148 percent increase in detections over a two-month period.

Pirate Chick Poses as VPN Tool, Secretly Installs Malicious Payloads

Malicious actors are bundling a Trojan called Pirate Chick, which looks like a virtual private network (VPN) software tool, into adware to install malware on infected machines.