Iranian Hackers Attacked Aerospace and Telecom Firms using Dropbox

Iranian Hackers Attacked Aerospace and Telecom Firms using Dropbox

A new cyber espionage campaign has been reported recently by the security firm, Cybereason, and this campaign is executed using Dropbox which is directed against the aerospace and telecommunications industries in the Middle East. They...
GriftHorse – New Android Trojan Steals Millions from Over 10 Million Victims Globally

GriftHorse – New Android Trojan Steals Millions from Over 10 Million Victims Globally

The mobile security firm Zimperium has recently detected an "aggressive" mobile campaign, that is named "GriftHorse," and it has affected over 10 million users from nearly 70 countries.  The attacks were conducted via innocuous Android...
Hackers Stealing Data From 378 Banking and Wallet Apps Using New Android Malware

Hackers Stealing Data From 378 Banking and Wallet Apps Using New Android Malware

A new mobile banking Trojan called ERMAC has been found recently, and this malware resembles to have been manufactured by cybercriminals at BlackRock, which is based on the roots of the infamous Cerberus. ERMAC is...
Hackers Have Figured Out a New Malware Evasion Technique to Fly Under The Radar

Hackers Have Figured Out a New Malware Evasion Technique to Fly Under The Radar

Google's THREAT ANALYSIS GROUP has recently discovered a type of malware that exploits a new method to circumvent detection by security products, and this malware easily modifies the digital signature of its files. Neel Mehta...
Windows Bug Let Hackers Install RootKits on All Windows-based Devices Since Windows 8

Windows Bug Let Hackers Install RootKits on All Windows-based Devices Since Windows 8

An unpatched vulnerability in Microsoft Windows Platform Binary Table (WPBT) has been identified by the cybersecurity researchers of Eclypsium.  This bug is continuously attacking all Windows-based devices since Windows 8 could be possibly exploited to...
China-Linked Group TAG-28

China-Linked Group TAG-28 Attack Indian Government Agency With Winnti Malware

The police department of India recently discovered that an Indian media conglomerate, Bennett Coleman And Co Ltd, (BCCL), and the Unique Identification Authority of India (UIDAI) database have been hacked probably by a Chinese...
APT-C-36 Hacking Group Uses Wide Range of Trojans (RATs) To Target Organizations

APT-C-36 Hacking Group Uses Wide Range of Trojans (RATs) To Target Organizations

A hacking group from Columbia which is dubbed as "APT-C-36" is running a phishing campaign that represents emails and attempts to accumulate victims in South America.  In this campaign, the threat actors have used a...
Numando – A Trojan Abuses YouTube & Pastebin to Spread  & Hack Windows Users

Numando – A Trojan Abuses YouTube & Pastebin to Spread & Hack Windows...

A Latin American banking Trojan named Numando has been detected recently by the ESET researchers, and it's targetting Brazil, some areas of Mexico, and Spain. Numando banking trojan is comparable to the other...
New Python Based Malware Attack Windows Subsystem for Linux To Evade Detection

New Python Based Malware Attack Windows Subsystem for Linux To Evade Detection

The Lumen Black Lotus Labs has identified Linux binaries or Python Based Malware built for the Windows Subsystem for Linux (WSL) to evade detection. The threat actors are seeking new techniques to stealthily compromise...
Hackers Using MSHTML 0-Days Exploit To Deploy Cobalt Strike Beacon On Windows

Hackers Using MSHTML 0-Days Exploit To Deploy Cobalt Strike Beacon On Windows

Microsoft announced a targeted phishing campaign that they have detected recently, and this campaign is exploiting MSHTML 0-Days exploit to deploy Cobalt Strike Beacon on Windows. But, right now at this moment, they have already...