Cyber Security News
Abyss Locker Ransomware Attacks Microsoft Windows and Linux Users
FortiGuard Labs has released a report detailing the emergence and impact of the Abyss Locker ransomware, which has been targeting Microsoft Windows and Linux...
Cyber Security News
8220 Hacker Group Attacking Linux & Windows Users to Mine Crypto
In a significant escalation of cyber threats, the 8220 Gang, a notorious Chinese-based hacker group, has intensified its attacks on cloud-based infrastructure, targeting both Linux and Windows users to mine cryptocurrency.This latest campaign,...
Botnet
FritzFrog Botnet Attacking Linux Servers to Steal SSH Credentials
The FritzFrog botnet, originally identified in 2020, is an advanced peer-to-peer botnet built in Golang that can operate on both AMD and ARM-based devices....
Cyber Security News
New Malware Hidden In PyPI Packages Attacking Windows & Linux Machines
A PyPI malware author identified as "WS" was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting both Windows and Linux...
Cyber Security News
3 New Malicious PyPI Packages Found Installing CoinMiner on Linux Devices
Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device performance.These packages, namely modular...
Cyber Security News
Hackers Attacking Linux SSH Servers to Deploy Scanner Malware
Hackers often target Linux SSH servers due to their widespread use in hosting critical services, and the following loopholes make them vulnerable, providing opportunities...
CVE/vulnerability
8220 Hacker Group Attacking Windows & Linux Web Servers
The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web servers with crypto-jacking malware....
Cyber Security News
NKAbuse Malware Attacking Linux Desktops & Use Corn Job for Persistence
Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining unauthorized access over...