Zero-day

PowerPoint Slide Show Infected by New Malware that Exploiting Zero-day RCE Vulnerability

New Malware that abuses MS Power point slide show by Exploiting the CVE-2017-0199 (Zero-day remote code execution vulnerability) flow Exists in Windows OLE (Object Linking and Embedding). Malicious Rich Text File (RTF) documents used for Exploit this Vulnerability by using Microsoft...
SonicSpy

Beware – More than Thousand Spyware Apps from “SonicSpy,” Family Identified in Google Play

Security experts from Lookout identified thousands of spyware apps in Google Play that belongs to SonicSpy family.They identified this threat after their cloud Security tool flagged the apps. This threat actor was deployed in February 2017 and they are more...
Fileless malware

Fileless malware that uses PowerShell scripts from Window’s registry leading to Click Fraud Malware...

Nowadays Hackers Distributing Advanced Fileless Malware with Evasion capabilities which are very Difficult to Detect. These types of malware sit in the system registry and making hard for Antivirus hard to identify the infection. The security researchers from Quick Heal...
Electrical Infrastructure

Large scale Cyber attack Targeting Weak Spot in the Vital Electrical Infrastructure

A new research published last week by Willem Westerhof describing an outsized scale cyber attack targeting the crucial electrical infrastructure based on existing outline that he published in ITsec 2016. He titled as Horus scenario which focuses on Cyber attack...
Fileless Malware

A Complete Fileless Malware “JS_POWMET” with Highly Sophisticated Evasion Technique

Hackers are Distributing Advanced Fileless Malware with Evasion capabilities that lead very Difficult to Detect With a different kind of Advance Attacking Capabilities and Methods. A Complete Fileless Malware was Detected as “JS_POWMET” that capable to evade the Security Control...

Most Popular

Recommended