APT15 Hackers  Using Steganography Technique to Drop Okrum Backdoor Via PNG File to Evade Detection

APT15 Hackers Using Steganography Technique to Drop Okrum Backdoor Via PNG File to...

Researchers discovered a previously unseen malware called Okrum that distributed from APT15 threat group via a hidden PNG file with steganography technique to...
FlawedAmmyy RAT

Microsoft Warns about the new Campaign that Delivers FlawedAmmyy RAT via Weaponized MS Excel...

Microsoft uncovered a new campaign with a sophisticated infection chain delivering notorious FlawedAmmyy RAT as a final payload. The attack starts with...
Fancy Bear APT Hackers Owned Zebrocy Malware Opens Backdoor on Victims Machine to Control it Remotely

Fancy Bear APT Hackers Owned Zebrocy Malware Opens Backdoor on Victims Machine to Control...

Cybercriminals from Sednit group, also known as Fancy Bear, APT28, Sofacy launching new Zebrocy Malware that indented to open backdoor...
JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and...
Twitter Bug

Twitter Bug Exposed Location Data of iOS Users to Advertiser

Twitter Bug Exposed location Data of Some Users to Unknown Advertisers Twitter disclosed a bug report that in certain conditions they have accidentally...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security