TeaBot Malware

TeaBot – A New Malware that stealing victim’s Credentials and Intercepting SMS Messages

A new trendy and massive android banking trojan was discovered and analyzed by Cleafy called TeaBot. This Teabot steals the victim’s credentials and SMS messages for enabling fraud scenarios against a predefined list of...
Security Flaws Russian Hackers

Top 12 Security Flaws Exploited by Russian Hackers to Target Organisations Globally

A joint advisory by the US Department for Homeland Security's Cybersecurity Infrastructure Security Agency (CISA), FBI, and the National Security Agency (NSA), as well as the UK National Cyber Security Centre warned organizations about...
WeSteal Cryptocurrency-Stealing

WeSteal: A Cryptocurrency-Stealing Malware that Sold in Dark Web Markets

A new cryptocurrency stealer called WeSteal is available on the cybercrime underground! its promises advertising as “the leading way to make money in 2021. What is WeSteal? WeSteal is a Python-based malware that uses regular expressions...
ToxicEye RAT

ToxicEye RAT Uses Telegram Communications to Steal Data from Victims and to Perform Malicious...

Researchers at Check Point Software Technologies found that hackers are leveraging the popular Telegram messaging app by embedding its code inside a remote access trojan (RAT) which is also known as ToxicEye. Telegram is the...
Beware of a New Malware Campaign that Hides Malicious code within BMP Image

Beware of a New Malware Campaign that Hides Malicious code within BMP Image

Lazarus APT is one of the most sophisticated North Korean Threat Actors that has been active since at least 2009. This actor is known to target the U.S., South Korea, Japan, and several other countries....
Dridex Network Attack Campaign

Dridex Network Attack Campaign Delivered by Cutwail Botnet and Poisonous PowerShell Scripts

The IBM X-Force threat intelligence team has recently reported that they are continuously witnessing a huge increase in Dridex-related network attacks, and all these attacks are executed by the Cutwail botnet.  According to the cybersecurity...
Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Nowadays, the phishing attacks are increasing at an alarming rate, and these attacks are drastically affecting and harming the business organization. Recently, the cybersecurity researchers have detected a phishing campaign in which the attackers...
Cyber Security Trends

Top Cyber Security Trends Expected In 2020

Cyber Security is vital for every business, it is import to protect your business against cyber attacks, a single cyber attack could cause serious damage. Cyber Security is the top priority for every organization...

Hundreds of Fake Online Shoe Stores Injected With Credit Card Skimmer To Steal User...

Hundreds of online web stores that sell counterfeit goods are affected by credit card skimmer that aimed to steal the customer credit card details. Several counterfeit online shoe stores offer great deals for the popular...

State-Sponsored APT Hackers From China, North Korea, Iran Focusing to Develop Android & iOS...

Mobile threats emerge as mobile devices become part of our day to day life. Exploiting mobile devices gives all-in-one means to targeted users' sensitive data. By hijacking mobile, attackers can gain access to various sensitive...