Dropper-for-Hire – Hackers Using a Single Malware to Drop 6 Different Malware in Targeted Systems

Dropper-for-Hire – Hackers Using a Single Malware to Drop 6 Different Malware in Targeted...

Researchers observed a new malware campaign under a dropper-for-hire method that drops 6 different malware to attack the targeted victims and perform...
Zeppelin

Hackers Using Remote Desktop Application To Install “Zeppelin” Ransomware & Encrypt Windows Files

Cybercriminals abusing a Remote Desktop application ConnectWise Control that previously known as (ScreenConnect) to deliver the Zeppelin Ransowmare (aka Vega) and encrypt...
Custom Malware

Unknown Hacking Group Launching Custom Malware “Dudell” via Weaponized Microsoft Excel Documents

Researchers discovered a new wave of custom malware campaign named as "Dudell" from previous unknown cyberespionage group dubbed Rancor. ...
Lazarus APT Hackers Group Attack Linux & Windows Platform Using  Dacls RAT

Lazarus APT Hackers Group Attack Linux & Windows Platform Using Dacls RAT

Researchers discovered a previously unknown fully functional Remote Access Trojan called "Dacls" from infamous Lazarus APT hackers group to attack Linux and...
Momentum Botnet

Momentum Botnet Attacks Linux Devices and Recruit them as Botnet to Launch DDoS Attacks...

Security researchers from Trend Micro observed a new malware activity targeting devices running the Linux platform, the malware samples found to be...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security