Friday, March 29, 2024
Home Search

Malicious actors - search results

If you're not happy with the results, please do another search

Gravity Malware Returns As Fake Encrypted Chat App To Steal Sensitive Data

0
The Android malware GravityRAT is back again, and this time this trojan disguised itself as a secure chat app with free encryption. The fake...

Snake Infostealer Malware Steal Credentials, Take Screenshot From Over 50 Apps

0
A new malware known as Snake has been detected recently by Cybereason security firm, this Snake malware is being used by the threat actors...

1,000,000 WordPress Websites Affected with OptinMonster Vulnerabilities

0
Multiple vulnerabilities were discovered recently by the Wordfence Threat Intelligence team in OptinMonster, it's a popular WordPress plugin that is already installed on more...

Hackers Are Exploiting a Flaw in Popular Billing Software to Deploy Ransomware

0
In various versions of the popular BQE Software BillQuick billing solution, the security analysts of Huntress Labs have warned of a critical SQL injection...

BazarLoader Windows Malware Let Hackers Allow Backdoor Access & Network Reconnaissance

0
A BazarLoader Windows malware campaign has been detected recently by the security firm, Unit42 of Plaalto Networks that was hosting one of their malicious...

Almost 25% of Weaponized JavaScript Samples are Obfuscated To Evade Detection

0
After analyzing more than 10,000 malicious JavaScript samples it's being concluded by the security analysts of Akamai that about 25% of the examined malicious...

Russian APT Hackers Attacking Financial Organizations With Weaponized Excel Document

0
The security company Morphisec has recently detected a malicious campaign named as MirrorBlast, and through this attack, the Russian hackers are targeting the financial...

Ukraine Police Arrests DDoS Botnet Operator Who Have Compromised 100,000 Devices

0
The law enforcement authorities of the Ukrainian have recently arrested a hacker on Monday who is accountable for the formulation and administration of a...

FontOnLake – Previously Unknown Malware Attack Linux Systems

0
A new modular Linux malware has been recently detected by ESET that is dubbed as FontOnLake. And this malware has many features, one of...

Why Companies Should Start Taking Behavioural Analysis Seriously?

0
Behavioural analysis uses machine learning, artificial intelligence, big data, and analytics to recognize malicious behavior by examining differences in everyday activities. Behavioural analysis is...

Managed WAF protection

Website

Recent Articles