Friday, March 29, 2024

SynAck Ransomware Attack Using Sophisticated Process Doppelgänging Technique to Bypass the AV Detection

0
Newly Emerging SynAck Ransomware using a sophisticated technique called Process Doppelgänging to bypass various modern security solutions.SynAck is the first Ransomware using this modern Anti-analysis and...

Indian Provident Fund Portal Hacked: Attackers May have been Stolen 27 Million Users...

0
A cyber Attack launch into Indian Provident Fund Portal called "Employees  Provident Fund Organization(EPFO)" and hackers may have been stolen around 27 Million registered peoples sensitive data.The...

Malicious Chrome Extension FacexWorm Spreads Through Facebook Messenger

0
A new variant of FacexWorm spreads through Facebook Messenger targets the users of cryptocurrency trading platforms if accessed from the affected browsers.FacexWorm is not...

Hackers Can Steal NTLM Credentials Through PDF Files

0
Hackers taking advantage of the recently disclosed Microsoft Office Exploitation that allows to include information that one document has in another document. Instead of...

Hacker Selling Powerful SquirtDanger Malware in Underground Market that Take’s Screenshot, Steal Wallets &...

0
Newly discovered botnet malware called SquirtDanger is widely Distributing, selling, and trading in the global underground market and infect the victims to steal the...

New Ransomware Attack Failed to Decrypt Files Even After Ransom Paid Due to Hackers...

0
A Brand new ransomware attack widely distributed and infect the users based on their geolocation by checking the infected device IP address.Malware authors designed...

APT Cyber Attack Using Unpatched Internet Explorer Zero-Day to Hack Windows Computers

0
Cyber Criminals behind the APT attack using an Internet Explorer Zero-Day vulnerability to compromise the windows based computers.An APT hacking group using MS Office document attack...

Cybercrime-as-a-Service – DDoS Attack Services Available in Dark Web Markets for $10 per Hour

0
The number of cyberattacks is increasing and cybercriminal evolving with new business models such as Cybercrime-as-a-service. Recent studies indicate cybercrime’s cost to businesses globally as...

Cyber Espionage Campaign Possibly “MuddyWater” Targets Middle East and Central Asia

0
A new campaign with the similarities of MuddyWater spotted targetting organizations in Pakistan, Turkey, and Tajikistan. Attackers use various social engineering methods to trick...

With New Bankshot Malware Cybercrime Group Hidden Cobra Targets Financial Sectors

0
Hidden Cobra cybercrime group continues to target multiple industries and financial sectors. With this new aggressive campaign, the group implanted Bankshot malware in Turkish...

Managed WAF protection

Website

Recent Articles