GBH
GBH

Hackers Hiding Malware Behind The PNG Images Using Steganography 

0
The Worok threat infects victims' computers with information-stealing malware by concealing malware within PNG images with the help of the Steganography technique, which makes...
Tips for Successful Data Conversion & to Improve Accuracy

Chinese APT Hackers Using a Custom Versions of Cobalt Strike to Deploy Backdoor Malware

0
Security analysts at Trend Micro have recently tracked down 'Earth Longzhi', a previously unknown Chinese APT hacking group that is actively targeting several organizations...
XENOTIME Hacking Group

LockBit 3.0 Malware Using Weaponized Word Doc To Drop Ransomware Via Amadey Bot

0
The Amadey Bot has been found to be used by attackers to install LockBit 3.0 with the help of malicious MS Word document files,...
Microsoft Released Final Version of Security Configuration Baseline for Windows 10 and Windows Server

APT-36 Hackers Using New Hacking Tools & TTPs To Attack Indian Government Orgs

0
The cybersecurity analysts at Zscaler ThreatLabz have recently detected a new malicious version of a multi-factor-authentication (MFA) solution, known as Kavach, which has been...
SandStrike

SandStrike – Previously Unknown Android Malware Attacks Android Users Via VPN App

0
Android users are being targeted by threat actors using spyware known as SandStrike, which is delivered via malware-infected VPN applications. In short, threat actors...

Active Raspberry Robin Worm Launch a ‘Hands-on-Keyboard’ Attacks To Hack Entire Networks

0
During recent research, Microsoft has discovered evidence of a complex interconnected malware ecosystem that is associated with the Raspberry Robin worm. With other malware families,...
Drinik Android Malware

Drinik Malware With Advanced Capabilities Targeting 18 Indian Banks

0
Drinik Android trojan is using a new version to target 18 Indian banks, posing as the app used by the country to manage tax...
RomCom RAT Distributed as Spoofed Versions of Popular IP Scanning Tool

RomCom RAT Distributed as Spoofed Versions of Popular IP Scanning Tool

0
The threat actor behind a remote access trojan, ‘RomCom RAT’ is now targeting Ukrainian military institutions. The threat actors are known to spoof legitimate...
Ukrainian Hacker Charged for Operating “Raccoon Stealer” Malware-as-a-Service

Ukrainian Hacker Charged for Operating “Raccoon Stealer” Malware-as-a-Service

0
In an international cybercrime operation dubbed Raccoon Stealer malware-as-a-service (MaaS), the Department of Justice has charged a Ukrainian 26-year-old, Mark Sokolovsky for playing a...

Complete Free Website Security Check

Website

Recent Posts