New Malware Uses Windows Subsystem for Linux for Stealthy Attacks

Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that hackers are trying

Read more

Hackers Shift from Malware to Credential Hijacking

Adversaries are relying less on malware to conduct attacks that are consequently more difficult to detect, according to an annual

Read more

We cannot allow cyberattacks to be the new normal

Cybersecurity has been a decades-long “grey rhino” in the wings of this “black swan” event. Last year, a Tokopedia data

Read more

BI warns of ‘large increase’ in sextortion attacks.

Hackers and creeps extorted $8 million from Americans over the first seven months of the year by threatening to publish

Read more

HackerCon – Begin your journey in Cyber Security

HackerCon.com is a project dedicated to  Cyber Security, Vulnerability Assessment, Penetration Testing, Malware, Hacking, and other cool stuff. I post articles related

Read more