multi-component Trojan Linux.LuaBot

Serious Threat: A multi-component Trojan from Linux.LuaBot family infecting Linux devices

Security Experts from Doctor Web have analyzed a complex multi-part Trojan that taints Linux devices having different hardware architectures. The Trojan contaminates devices having the accompanying models: Intel x86 (and Intel x86_64), MIPS, MIPSEL, Power PC, ARM, SPARC, SH4, and...
windows

400 Million Windows Computer Vulnerable to “Bashware” Security Software Bypass Attack

A New Attacking Technique called "Bashware" can able to Bypass all Windows Based Security Software solutions by abusing the New Windows 10 Future called Windows Subsystem for Linux (WSL) and Injecting the Backdoor. WSL is Compatibility Layer for running Linux binary...
Linux Backdoor

Linux Backdoor that Creates Fully Encrypted Reverse Shell and Attack Unsecured Linux Systems

A dangerous Linux backdoor Chaos that targeting improperly Secured Linux systems by using fully encrypted and integrity checked reverse shell. Hackers performing  SSH brute-force attacks on Linux systems that secured by weak password and executing the Chaos Backdoor. Chaos Backdoor was part of the  ‘sebd’...
Cybercrime as a Service

Cybercrime as a Service – Hackers Selling Ransomware, RDP logins and Credit Card Details...

The underground markets flooded with a number of hacking tools that can be used to perform various malicious activities in the form of Cybercrime as a Service. All these tools and services are offered...
Fancy Bear APT Hackers Owned Zebrocy Malware Opens Backdoor on Victims Machine to Control it Remotely

Fancy Bear APT Hackers Owned Zebrocy Malware Opens Backdoor on Victims Machine to Control...

Cybercriminals from Sednit group, also known as Fancy Bear, APT28, Sofacy launching new Zebrocy Malware that indented to open backdoor on the targeted machine to gain the remote access. The sednit hacking...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended