Home Search

backdoor - search results

If you're not happy with the results, please do another search
Atomic macOS Info-Stealer Upgraded

Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence

The notorious Atomic macOS Stealer (AMOS) malware has received a dangerous upgrade that significantly escalates the threat to Mac users worldwide. For the first...

TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections

The cybersecurity landscape faces a renewed threat as TA829, a sophisticated threat actor group, has emerged with enhanced tactics, techniques, and procedures (TTPs) alongside...

Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor

A sophisticated multi-stage malware campaign has been discovered targeting WordPress websites, employing an intricate infection chain that delivers Windows trojans to unsuspecting visitors while...

LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly

A sophisticated China-linked cyber espionage campaign has emerged, targeting over 1,000 Small Office/Home Office (SOHO) devices worldwide through an advanced Operational Relay Box (ORB)...

Governments Losing Efforts To Gain Backdoor Access To Secure Communications – New Report

A comprehensive analysis reveals that government attempts to weaken encryption and gain backdoor access to secure communications are increasingly failing across multiple jurisdictions, as...
Active Directory Client-Side Extensions

Custom Active Directory Client-Side Extensions Enable Stealthy Corporate Backdoors

A sophisticated method for establishing persistent backdoors in corporate networks through the abuse of custom Client-Side Extensions (CSEs) in Microsoft Active Directory environments. This technique...

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors

A critical remote code execution vulnerability in SAP NetWeaver Visual Composer (CVE-2025-31324) is being actively exploited by a Chinese threat actor to compromise enterprise...

Iranian Hackers Breaches Critical National Infrastructure With multiple Webshells & Backdoors

A sophisticated cyber intrusion targeting critical national infrastructure in the Middle East has been uncovered, with evidence pointing to an Iranian state-sponsored threat group. The...

New Stealthy NodeJS Backdoor Infects Users via CAPTCHA Verifications

A sophisticated malware campaign has emerged that deploys stealthy NodeJS backdoors through deceptive CAPTCHA verification screens, security researchers revealed today. This campaign represents a growing...

Malicious npm Packages Attacking Linux Developers to Install SSH Backdoors

A concerning new supply chain attack has emerged targeting Linux developers who work with Telegram's bot ecosystem. Discovered in early 2025, several malicious npm packages...

Exclusive Stories