Thursday, March 28, 2024
Home Search

Malicious actors - search results

If you're not happy with the results, please do another search

Brokenwire – A New Wireless Attack that Halts Charging System for Electric Vehicles

0
In collaboration with Armasuisse and Swiss researchers, the cybersecurity researchers at Oxford University have discovered a novel attack method for remotely stopping EV charging.CCS...

Russia Linked Android Malware Access Camera, Audio & Location

0
Hacking group Turla is part of the Russian intelligence service that utilizes custom malware to perform cyberespionage mainly to target systems and entities from:-EuropeAmericaIt...

Chinese Hackers Are Abusing Log4Shell to Deploy Rootkits on VMware Horizon Servers

0
A new rootkit named Fire Chili has been deployed on VMware Horizon servers by the Chinese hacking group Deep Panda using the Log4Shell exploit...

Hackers Pushed Mars Stealer Malware via OpenOffice Ads on Google

0
Mars Stealer, a recently launched data-stealing malware variant, has recently gained massive popularity. However, the first large-scale attack employing it has been identified by...

Chinese Threat Actor Targeting Ukraine Since the Russian Invasion

0
For the first time since Russia invaded Ukraine, the Computer Emergency Response Team (CERT-UA) of Ukraine has revealed recently that Chinese threat actors have...

Hackers Use XLL Files to Deliver Obfuscated Version of JSSLoader

0
Recently it has been observed that Morphisec Labs has witnessed a new wave of JSSLoader infections this year. JSSLoader activity has been tracked by...

Microsoft has Confirmed that they Were Compromised by the Lapsus$ Hacking Group

0
The Lapsus$ hacking group recently compromised one of Microsoft's employees, which allowed the threat actors to steal parts of Microsoft's source code. There is...

Hundreds of GoDaddy’s Managed WordPress Sites Infected With Same Backdoor Payload

0
The Wordfence Incident Response team has recently discovered that hundreds of websites that are hosted on GoDaddy's managed WordPress service are infected with the...

Android Trojan On the Google Play Store With Over 500,000 Installs Steals from Notifications

0
On the Google Play Store, the cybersecurity analysts at Dr.Web have recently witnessed a major tip in trojan infiltration. Not only that even they...

Hackers Using Cheat Lures to Distribute Powerful Information Stealer Malware

0
A malware distribution campaign has been detected recently by Korean cybersecurity researchers and ASEC security firm. In this malicious campaign, to trick the Velorant...

Managed WAF protection

Website

Recent Articles