Linux is considered a more secure and privacy-focused operating system than Windows, not only because of a low market share (only 2% of all installed desktop operating system) but also…
Read More
Linux is considered a more secure and privacy-focused operating system than Windows, not only because of a low market share (only 2% of all installed desktop operating system) but also…
Read More
Cybercriminals execute malware attacks using different attack vectors and using different methods. The number of malware strains is increasing in an unprecedented manner and hence malware analysis today is not…
Read More

An international law enforcement operation has led to the dismantling of the global cybercrime networkcybercrime network that used the GozNym banking malware to steal money from bank accounts across the…
Read More
This is news! A laptop containing six of the most dangerous of malware created till date is up for auction. A Samsung NC10-14GB 10.2-Inch Blue Netbook, which contains six such…
Read More
Tax Accounting Firm Wolters Kluwer, valued at $4.8 billion is currently suffering a severe malware attack that forced the company to take down their tax returns database since May 6,…
Read More
The development methodology of malware has changed drastically, something that cannot be ignored. A few years ago, the primary objective of the hackers was to rake profit and avoid detection….
Read More
The Japanese government has decided to create and maintain defensive malware in a bid to secure the country against cyberattacks. Catalin Cimpanu, security reporter at ZDNet, writes, “The Japanese Defense…
Read More
The Emotet malware has been frequently covered here in Hackercombat since July last year. It is not uncommon for a cyber security-centered website to discuss most if not all of…
Read More
In 2018 Palo Alto Networks’ Unit 42 researchers announced that they have identified a spear phishing campaign that is targeting U.S. National security think tanks and academic institutions. Research indicates…
Read More
Malware Analysis: An Introduction Cybercriminals are becoming more sophisticated and innovative, new and advanced varieties of malware are coming up, and malware detection is becoming a real challenge. Malware analysis,…
Read More