Friday, April 26, 2024

CryWiper Malware Masquerades as Ransomware & Purposely Destroys Data

0
CryWiper, a previously unknown data wiper that masquerades as ransomware, has been recently discovered and is spreading around the internet. Furthermore, this ransomware completely...

New Android Malware Stolen Facebook Credentials From 300,000 Victims

0
The mobile security firm Zimperium has recently issued a warning about a Trojan called "Schoolyard Bully," which is actively masquerading as an educational application...
Hackers Using Malicious USB Devices

Beware that Hackers Using Malicious USB Devices to Deliver Multiple Malware

0
Recently, Mandiant Managed Defense discovered cyber espionage activity that focuses on the Philippines and mainly uses USB drives as an initial infection vector. This operation,...
KmsdBot

Accidental Syntax Error Leads to Kill The Cryptomining botnet Malware “KmsdBot”

0
It turns out that Akamai's team of researchers accidentally killed a newly discovered cryptocurrency mining botnet known as KmsdBot during the investigation.Due to a...

Chrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard Contents

0
In order to steal cryptocurrency and clipboard contents, ViperSoftX was detected by the security analysts at Avast, a Windows malware that is using a...

Chinese Hackers Using 42,000 Phishing Domains To Drop Malware On Victims Systems

0
An extensive phishing campaign targeting businesses in numerous upright markets, including retail, was discovered by Cyjax recently in which the attackers exploited the reputation...

U.S. Federal Network Hacked – Iranian APT Hackers Compromised Domain Controller

0
Recently, the FBI and CISA published a joint advisory in which they disclosed an Iranian APT group compromised the Federal Civilian Executive Branch (FCEB)...

KmsdBot – A Malware Written in Golang Infects Via SSH To Perform DDoS Attack

0
Recently, a new piece of evasive malware has been discovered that is able to gain entry into enterprise systems in order to mine cryptocurrency...

Hackers Hiding Malware Behind The PNG Images Using Steganography 

0
The Worok threat infects victims' computers with information-stealing malware by concealing malware within PNG images with the help of the Steganography technique, which makes...

Chinese APT Hackers Using a Custom Versions of Cobalt Strike to Deploy Backdoor Malware

0
Security analysts at Trend Micro have recently tracked down 'Earth Longzhi', a previously unknown Chinese APT hacking group that is actively targeting several organizations...

Managed WAF protection

Website

Recent Articles