Saturday, June 22, 2024
Home Search

malware - search results

If you're not happy with the results, please do another search

Hackers Weaponize Windows Installer (MSI) Files to Deliver Malware

0
Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by a threat actor group, Void Arachne.This group has targeted Chinese-speaking users by distributing malicious...
Stuxnet Malware Air-Gapped Networks

Stuxnet, The Malware That Propagates To Air-Gapped Networks

0
Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA) systems used in industrial facilities.By exploiting multiple vulnerabilities, including...

Beware Of Fake Microsoft Teams Website That Installs Oyster Malware

0
Fake websites of authoritative and popular companies claiming to be genuine sites make users believe that the site belongs to that specific company and...

Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users

0
A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage campaign named Operation Celestial Force, targeting Indian entities.Since 2018, they...

AWS Announced Malware Detection Tool For S3 Buckets

0
Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection for Amazon Simple Storage Service (Amazon S3).This new feature...

Hackers Exploiting Linux SSH Services to Deploy Malware

0
SSH and RDP provide remote access to server machines (Linux and Windows respectively) for administration. Both protocols are vulnerable to brute-force attacks if solid...

SSLoad Malware Employs MSI Installer To Kick-Start Delivery Chain

0
Malware distributors use MSI installers as Windows OS already trusts them to run with administrative rights by bypassing security controls.For this reason, MSI files...

Beware of Fake KMSPico Activators that Deliver Vidar Stealer Malware

0
Researchers detected an attack involving a fake KMSPico activator tool, which delivered Vidar Stealer through several events.The attack leveraged Java dependencies and a malicious...

GoldPickaxe iOS Malware Harvests Facial Recognition Data & Bank Accounts

0
Due to the growing popularity of Apple devices, cybercriminals are increasingly targeting iOS and macOS with malware.The App Store is no longer secure,...

Muhstik Malware Attacking Apache RocketMQ To Execute Remote Code

0
Apache RocketMQ platform is a widely used messaging system that handles high volumes of data and critical operations, often attracting hackers. Exploiting the vulnerabilities in...

Managed WAF protection

Website

Recent Articles