ethicalhackersacademy
Fake Trump’s Scandal Video Used to Deliver QNode Malware

Fake Trump’s Scandal Video Used to Deliver QNode Malware

The cybersecurity researchers at Trustwave have identified a new Mailspam campaign while reviewing a spam trap. However, this campaign shares a remote...
Profiling Cyber Threat Modeling Methodologies to Secure IT Infrastructure

Profiling Cyber Threat Modeling Methodologies to Secure IT Infrastructure

Introduction Threat modeling is a systematic framework by which IT professionals can classify possible security threats and vulnerabilities, measure...
Operation ElectroRAT – Attacker Creates Fake Companies to Steal Cryptocurrencies

Operation ElectroRAT – Attacker Creates Fake Companies to Steal Cryptocurrencies

Security researchers at Intezer Labs had discovered a Remote Access Trojan (RAT). The attacker behind this operation has enticed cryptocurrency users to download...
Types of Malware

10 Different Types of Dangerous Malware Attack and How to Avoid them

Today's topic is basically about types of malware, yes, it's a malicious software which is basically designated to damage, impair, or exploit...
Ransomware Operators Using SystemBC Backdoor with Tor proxy & RAT Futures to Attack New Targets

Ransomware Operators Using SystemBC Backdoor with Tor proxy & RAT Futures to Attack New...

SystemBC is a commodity malware sold on undercover marketplaces; ransomware-as-a-service (RaaS) operations are practicing this malware to disguise all kind of malicious...
Adrozek Malware Silently Hijacks Microsoft Edge, Google Chrome, Yandex & Firefox Browsers

Adrozek Malware Silently Hijacks Microsoft Edge, Google Chrome, Yandex & Firefox Browsers

Recently, Microsoft 365 Defender Research affirmed that they had recorded a new malware that has been continuously attacking popular browsers like Google...
DeathStalker APT Hackers Launch PowerPepper Malware That Leveraged DNS over HTTPS as a C2 Channel

DeathStalker APT Hackers Launch PowerPepper Malware That Leveraged DNS over HTTPS as a C2...

Researchers have recently detected a new malware "PowerPepper" activity from DeathStalker. It is the advanced persistent threat (APT) actor, recognized for contributing...
New Turla Crutch Backdoor Exfiltrate Stolen Documents to Dropbox With Turla Hacking Tools

New Turla Crutch Backdoor Exfiltrate Stolen Documents to Dropbox With Turla Hacking Tools

The cybersecurity researchers of ESET has identified an undocumented backdoor and document stealer that was dubbed as “Turla Crutch” by its founder....
Critical Oracle WebLogic Flaw Actively Exploited by DarkIRC Malware

Critical Oracle WebLogic Flaw Actively Exploited by DarkIRC Malware

Recently, the Juniper threat lab has identified a DarkIRC botnet that is actively attacking thousands of exposed Oracle WebLogic servers. All these...
Hackers Launching 13-year old Massive Backdoor Trojan Campaign to Attack Various Targets Worldwide

Hackers Launching 13-year old Massive Backdoor Trojan Campaign to Attack Various Targets Worldwide

Recently, the Checkpoint researchers asserted that the APT team was behind the hacking operation Dark Caracal. But, the company's security experts have...
ethicalhackersacademy

Recent News