ExileRAT

Hackers Launching Powerful Malware ExileRAT Via Weaponized Microsoft PowerPoint Document

Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2 server infrastructure. Attackers deliver the malware via Email attachment and the Mail address represented...
SpeakUp

SpeakUp – A New Undetected Backdoor Exploiting Six Linux Distributions With Known Vulnerabilities

A new trojan dubbed SpeakUp exploiting six different Linux distributions with know vulnerabilities. The campaign primarily targeting East Asia and Latin America, including AWS, hosted machines. Security researchers from checkpoint detected the campaign that...
KerrDown

OceanLotus(APT32) Threat Actor Group Deliver KerrDown Malware Via Word Document and RAR Archive

OceanLotus group known for Multiple attack campaigns around the globe, the threat actor group targets private sectors across multiple industries, foreign governments, activists, and dissidents connected to Vietnam. Palo Alto Networks’ Unit 42 division...
TheMoon

Hackers Offered IoT Botnet as Service “TheMoon” : Botnet-as-a-Service

TheMoon botnet was first identified in 2014 and it targets exploits on the router developed by companies such as Linksys, ASUS, MikroTik and D-Link. The botnet operators used the proxy botnet for various activities...
Mac Malware

Mac Malware Steals Cookies & saved Passwords when Users Visiting Crypto Exchange Service Websites

A new dangerous Mac Malware discovered that stealing the cookies when users visiting a website that belongs to cryptocurrency exchanges and wallet service along with saved credentials from Chrome Browers. "Web cookies are...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended