Search results for:
sophisticated malware
Cryptocurrency hack
North Korean Hacking Group “Lazarus” Targeting Banks & Bitcoin Users Via Sophisticated Malware
A New Malware campaign dubbed HaoBao distributing by North Korean Hacking Group "Lazarus" that specifically targets cryptocurrency and financial organizations via sophisticated cyber Attack.
North Korean...
Malware
New sophisticated Malware campaign Leveraging NSA Exploits to Mine Monero on Windows and Linux Systems
A new sophisticated malware campaign dubbed "Zealot" leveraging NSA exploits targeting Windows and Linux systems to mine Monero on Internal Networks.
Security researchers from F5...
Malware
Comodo Threat Research Labs discovered new sophisticated malware “Tordow v2.0” easily gain your mobile root privilege
Android malware “Tordow v2.0” which specifically affected to mobile bank user in Russia has been discovered by Threat Researchers of comodo TRL.
spoke person said...
Cyber Attack
Sophisticated Cyber Attack Mimics Booking Websites to Unleash LummaStealer Malware
A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware.
This campaign leverages fake CAPTCHA prompts and social engineering techniques...
Cyber Security News
BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial sample (MD5 14f6c034af7322156e62a6c961106a8c) provided valuable insights into its version...
cyber security
ANY.RUN Sandbox Now Let SOC & DFIR Teams Analyze Sophisticated Linux Malware
The ANY.RUN sandbox has now been updated with support for Linux, further enhancing its ability to provide an isolated and secure environment for malware...
Malware
Beware of Highly Sophisticated DarkTortilla Malware Distributed Via Phishing Sites
Cyble Research and Intelligence Labs (CRIL) detected threat Actors (TAs) distributing the malware DarkTortilla. Since 2015, the complex .NET-based malware known as DarkTortilla has been...
cyber security
Hackers Abuse Website Contact Forms To Deliver Sophisticated IcedID Malware
The security researchers at Microsoft have recently detected that hackers are continuously abusing legitimate corporate contact forms to send phishing emails.
The main motive of...