Advanced Backdoor

Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers

Cybercriminals are using the most sophisticated techniques to bypass the security controls in various organization such as  IT, medical, manufacturing industries, energy sectors, even government entities. Sometimes developers are creating a backdoor for a legitimate purpose such as maintenance and easy...
Cyptominer

XMRig – New Cryptojacking Malware Attack on Apple Mac Devices

New Mac Cyptominer Malware  XMRig affected Mac users that cause a sudden increase of the CPU process called mshelper and the fans are running out of control to mine Monero cryptocurrency. A malicious process mshelper talking the complete CPU process...
FlawedAmmyy

Hackers Launching FlawedAmmyy Malware Via Undetected MS Excel Macros that Carried Powerful Backdoor

Threat actors from TA505 currently spreading powerful FlawedAmmyy RAT via weaponized MS Excel documents with malicious Excel 4.0 macro which is hard to detect by standard security controls. Observed FlawedAmmyy RAT sample is highly...
APT

OceanLotus APT Hacking Group Distributing Backdoor to Compromise Government Networks

OceanLotus APT group as know as s APT32 and APT-C-00, emerging again targeting organization and government networks by distributing backdoor to compromise their infrastructure. Cyber Criminals using variously advanced techniques to compromise the victims and execute the backdoor into their...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended