Python Backdoor

New Python Backdoor Allows Hackers to Control Your Infected Device Remotely

A Newly discovered backdoor that was written in Python has been detected as Python.BackDoor.33 with 3  interesting futures (stealer, keylogger, backdoor) that allow hackers to take full control of your infected device. Recent threats are mainly had backdoor capabilities and...
FTP

SYSCON Backdoor Uses FTP as a Command & Control Server

A Critical Backdoor called "SYSCON" uses File Transfer Protocol ( FTP ) as a Command & Control Server unlike Traditional Command & Control Server that uses HTTPS or TCT/IP Connections. Using FTP Sever as a Command &  Control Server Provide several...

New Trending Method of Network Based ATM Malware Attacks

Nowadays  ATM Based Cyber Attacks are Evolving with Much More Advance methods and Functions via Sophisticated Malware especially through Network Based ATM Malware Attacks that Play Major Role in Digital ATM Related Cyber Attacks. Traditions physical attempt of emptying ATM...
WordPress Security Plugin

Hackers Hidden Backdoor Inside of Malicious WordPress Security Plugin

Hacker Hide the PHP Backdoor Inside of the WordPress Security Plugin called X-WP-SPAM-SHIELD-PRO" code and it contains Legitimate Plugin Name but it has Hidden Backdoor and Performing some Dangerous Malicious Activities. This Fake Malicious Plugin Use the Reputation of WP-SpamShield and...
windows

400 Million Windows Computer Vulnerable to “Bashware” Security Software Bypass Attack

A New Attacking Technique called "Bashware" can able to Bypass all Windows Based Security Software solutions by abusing the New Windows 10 Future called Windows Subsystem for Linux (WSL) and Injecting the Backdoor. WSL is Compatibility Layer for running Linux binary...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended