Malicious actors - search results

If you're not happy with the results, please do another search
Foxit Reader Vulnerability Let Hackers Run Malicious Code via PDFs

Foxit Reader Vulnerability Let Hackers Run Malicious Code via PDFs

Aleksander Nikolic, the security expert of Cisco Talos has recently detected a vulnerability that is continuously targeting the "Foxit Reader."
Linux kernel Bug Let Attackers Insert Malicious Code Into The Kernel Address Space

Linux kernel Bug Let Attackers Insert Malicious Code Into The Kernel Address Space

The cybersecurity researchers have detected that the Linux kernel bug is allowing the threat actors to implement some malicious code into the...
ToxicEye RAT Uses Telegram to Steal Data from Victims and Perform Malicious Activities

ToxicEye RAT Uses Telegram to Steal Data from Victims and Perform Malicious Activities

Cybersecurity researchers have recently detected several attacks that are generally using a remote access virus through Telegram communications to steal data from...
New Malicious Document Builder Named “EtterSilent” Used by Top Hackers Groups

New Malicious Document Builder Named “EtterSilent” Used by Top Hackers Groups

A new hacking tool for carrying out email attacks has been promoted by the threat actors on hacker forums since at least...
Malicious Firefox Extension

Malicious Firefox Extension that Allows Attackers to Access and Control Users’ Gmail Accounts

Proofpoint Threat Research has tracked low-volume phishing campaigns targeting Tibetan organizations globally. In January and February 2021, experts observed threat actors aligned...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security