SIEM as a Service
Home Malware Attack News

Malware Attack News

Our Malware Attack News category keeps you informed about the latest threats affecting systems worldwide. From ransomware outbreaks to spyware and trojans, we provide up-to-the-minute updates on malware trends and their impact on businesses and individuals.

Our expert insights help you understand how these attacks happen and what steps to take to protect your data. Get detailed analyses of high-profile malware campaigns, emerging vulnerabilities, and cybersecurity defenses.

Android Phones With Pre-installed  Malware

Newly Purchased Android Phones With Pre-installed Malware Mimic as WhatsApp

A sophisticated cryptocurrency theft operation has been uncovered where brand-new Android smartphones arrive with pre-installed malware masquerading as legitimate WhatsApp applications.  Threat actors have infiltrated the supply chain of several Chinese smartphone manufacturers, embedding malicious...
MediaTek Bluetooth Chipset Vulnerabilities

Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users

A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms. MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
Radiant Hacked

Radiant Hacked – $50 Million USD Worth Crypto Stolen by North Korean Hackers

Radiant Capital, a prominent decentralized finance (DeFi) protocol, has fallen victim to a major security breach, resulting in the loss of approximately $50 million USD. The attack, which exploited vulnerabilities in the devices of...
GPU DDK Vulnerabilities

Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory

A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA). On...
LINUX Rootkit malware

Rootkit Malware Exploiting 0-Day Vulnerabilities to Control Linux Systems Remotely

Fortinet researchers uncovered an advanced rootkit malware exploiting multiple zero-day vulnerabilities in enterprise appliances by executing a shell script (Install.sh). The analysis sheds new light on how attackers establish persistence, hijack network traffic, and remotely...
Botnet Exploits MikroTik Devices

Botnet Exploits 13,000 MikroTik Devices By Abusing Misconfigured DNS Records

Cybersecurity experts at Infoblox Threat Intel have uncovered a sophisticated botnet leveraging misconfigured DNS records to bypass email protection systems and deliver malware through spam campaigns. This botnet, comprising approximately 13,000 compromised MikroTik routers,...
Hackers Attacking Employees With Weaponized Google Drive Links To Deliver Malware

Hackers Weaponize Google Drive Links to Breach Corporate Networks

A sophisticated attack campaign targeting organizations in Japan and other East Asian countries. The threat actor, identified as APT-C-60, is employing a clever social engineering tactic that exploits job application processes to infiltrate corporate...

New Process Hollowing Attack Vectors Uncovered in Windows 11 (24H2)

The recent release of Windows 11 version 24H2 has introduced a range of new features and updates, but it has also raised significant cybersecurity concerns. A longstanding malware technique known as Process Hollowing or RunPE...
North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages. It is intended to steal information and load additional stages of malware, notably a multi-stage Python-based...
Red Team Tools in RDP Attacks

Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...

In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been linked to a massive rogue Remote Desktop Protocol (RDP) campaign. Earth...
SIEM as a Service

Recent Posts