Home Search
malicious - search results
If you're not happy with the results, please do another search
Beware That Hackers Using Legitimate Remote Monitoring For Malicious Purposes
A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC)...
VASTFLUX – Hackers Exploiting Restricted in-app Environments to Run Malicious Ads
VASTFLUX, a large-scale well-organized, and sophisticated ad fraud operation were recently taken down by cybersecurity researchers at HUMAN Security Inc.
On a daily basis, 12...
Beware! Gootkit Loader Malware Using VLC Player to Deliver Malicious Payloads
Trend Micro researchers recently reported that Australian healthcare entities were infected with a Cobalt Strike beacon after a new SEO poisoning campaign has been...
Hackers Using Microsoft-signed Malicious Windows Drivers in Ransomware Attacks
Following a series of cyberattacks, including ransomware attacks, Microsoft recently revoked several Microsoft hardware developer accounts.
In a coordinated disclosure, the news came from the...
OnionPoison – Hackers Distribute Malicious Tor Browser Installer Via Famous YouTube Channel
The cybersecurity experts at Kaspersky Lab have detected an encrypted version of the Windows installer for the Tor Web Browser has been distributed via...
Critical Atlassian Bitbucket Server and Data Center Flaw Let Attackers Execute Malicious Code
Atlassian revealed a critical security flaw in Bitbucket Server and Data Center that allows attackers to execute malicious code on vulnerable instances. The critical...
North Korean Hackers Uses Malicious Browser Extension To Steal Emails From Chrome
Kimsuky, a North Korean hacker group is believed to be hacking the major web browsers with the help of a malicious browser extension, which...
NSA Issued an Advisory for System Administrators to use PowerShell for Detecting Malicious Activity
A recent advisory from the National Security Agency (NSA) recommended that system administrators use PowerShell to manage systems. PowerShell is a program that can...
Apple Blocked 1.6 Million Malicious Apps from Defrauding Users
Apple says that its App store safety mechanisms blocked $1.5 billion in fraudulent App Store transactions, 1.6 million risky and vulnerable apps, and app...
New Microsoft Office Zero-day Vulnerability Let Attackers Execute Malicious PowerShell Commands
Security researchers have recently discovered a new zero-day vulnerability in Microsoft Office, resulting in the execution of code when exploited.
It is possible to exploit...