njRAT Backdoor

APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device

Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250) to hide the njRAT backdoor and targeting users reside in the Middle East via decoy Word document to compromise and control the device.
Mirai Malware

New Mirai Malware Attack on Enterprise Wireless Presentation systems and Supersign TVs

Mirai malware is a powerful strain that compromises a number of Linux devices and uses those devices to launch a massive distributed denial of service attacks. The new malware variant targets embedded devices such...
IMAP

Hackers Bypass Multi-factor Authentication to Hack Office 365 & G Suite Cloud Accounts Using...

attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based on Proofpoint study, IMAP is the most abused protocol, IMAP is the protocol that...
Counter-Strike vulnerabilities

Zero-Day Flaws in Counter-Strike 1.6 Exploited by Malicious Servers to Hack Players Computer

Hackers exploiting zero-day vulnerabilities in Counter-Strike 1.6 game client to infect player's devices by using a malicious gaming server and downloads malware into their devices. The Counter-Strike game was decades old but still have...
Powload Malware

Hackers using steganography to Drop the Powload Malware & Hide Their Malvertising Traffic

Cyber criminals now approaching a unique way to spread Powload malware with the help of steganography to infect the targeted system. Powload campaign activity distributing since 2018 through fileless techniques and hijacking email accounts...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended