Friday, March 29, 2024
Home Search

malware - search results

If you're not happy with the results, please do another search

How to Analyse Linux Malware in ANY.RUN

0
Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In 2022, Linux malware incidents...

Earth Preta Hackers Abuses Google Drive to Deploy DOPLUGS Malware

0
Threat actors abuse Google Drive for several malicious activities due to its widespread use, easy file sharing, and collaboration features.These things provide a convenient...

Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts

0
A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged.This information stealer has been active since at least August...

New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency

0
The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host.The campaign employed many Redis system-weakening commands to potentially...

Hackers Arrested For Stealing Banking Credentials Using Android Malware

0
An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging...

New TicTacToe Malware Dropper Attacking Windows Users

0
Malware often targets Windows users due to the operating system's widespread popularity, making it a lucrative target for threat actors. Windows systems have historically been...

Ukrainian Hacker Pleads Guilty for Leading Zeus & IcedID Malware Attacks

0
Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying the notorious Zeus and...
OpenAI shuts down Hacker Accounts

OpenAI Shuts Down Accounts Used to Generate Phishing Emails & Malware

0
While Artificial Intelligence holds immense potential for good, its power can also attract those with malicious intent. State-affiliated actors, with their advanced resources and expertise,...

New HijackLoader Malware Uses Advanced Techniques to Avoid Detection

0
Threat actors exploit HijackLoader because it is a powerful tool for injecting malicious code into legitimate processes, enabling stealthy execution of payloads. This technique helps...

Alert! 333% Surge in Hunter-Killer Malware that Bypasses Network Security Controls

0
Hunter-Killer is a sophisticated type of malware primarily designed to actively seek out and neutralize other malware present on a system. It operates by identifying...

Managed WAF protection

Website

Recent Articles