Thursday, December 7, 2023

Trickbot Malware Developer Pleads Guilty & Faces 35 Years in Prison

0
A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware. Trickbot, a suite of malware tools, targeted hospitals and businesses,...
Hackers Weaponized Documents Aerospace

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

0
An American aerospace company has been the target of a commercial cyberespionage campaign dubbed AeroBlade, which appears to be aimed at carrying out both...
Hackers Antivirus RedLine Malware

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

0
The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in underground communities.Threat actors use...

Iranian Mobile Banking Malware Steal Login Credentials & Steal OTP Codes

0
An Android malware campaign was previously discovered that distributed banking trojans targeting four major Iranian Banks: Bank Mellat, Bank Saderat, Resalat Bank, and Central...

NukeSped Malware Exploiting Apache ActiveMQ Vulnerability

0
The Andariel threat group has been discovered installing malware via the exploitation of the Apache ActiveMQ remote code execution vulnerability classified as CVE-2023-46604.The group is known...

Konni Group Uses Weaponized Word Documents to Deliver RAT Malware

0
In the ever-evolving cybersecurity domain, the resurgence of NetSupport RAT, a Remote Access Trojan (RAT), has raised concerns among security professionals. This sophisticated malware, initially...
DarkGate Evolved Complete Toolkit

DarkGate Malware-as-a-Service Evolved as Complete Toolkit

0
DarkGate is a complete toolkit, first discovered in 2018, that provides attackers with extensive capabilities to access target systems completely.On underground cybercrime forums, an...

Hackers Abusing WhatsApp Messages to Install Android Malware

0
Embarking on a journey into the realm of cyber threats, Microsoft recently uncovered a series of mobile banking trojan campaigns meticulously designed to exploit...

Hackers Exploit Asset Management Program to Deploy Malware

0
The Andariel group has been identified in recent reports as distributing malware through asset management programs. This group has been previously discovered to be...
Threat Intelligence with Sandbox Analysis

Threat Intelligence with Sandbox Analysis: Security Analyst Guide – 2024

0
Threat intelligence (TI) is critical to organizations’ cybersecurity infrastructure, allowing them to keep track of the evolving threat landscape and ensure timely detection. However,...

Managed WAF protection

Website

Recent Articles