SIEM as a Service
Home Search

malware - search results

If you're not happy with the results, please do another search
Hackers Abuse EDRSilencer Red Team Tool To Evade Detection

Hackers Abuse EDRSilencer Red Team Tool To Evade Detection

EDRSilencer is a tool designed to enhance data privacy and security by "silencing" or "blocking" unwanted data transmissions from endpoints. The tool is likely used...
Hackers Using Bitbucket Code Hosting Platform To Host Malicious Payloads

Hackers Using Bitbucket Code Hosting Platform To Host Malicious Payloads

Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting Bitbucket, a popular code hosting platform, to deliver dangerous payloads to unsuspecting victims. The attackers...
New Post-Exploitation Toolkit!

SideWinder APT Hackers Added New Post-Exploitation Toolkit to Their Arsenal

Security researchers at Kaspersky have uncovered a significant expansion in the capabilities of the SideWinder advanced persistent threat (APT) group. In a report published...
ErrorFather Hackers Attacking Android Users To Take Control Of The Device

ErrorFather Hackers Attacking Android Users To Take Control Of The Device

Cerberus is an advanced Android banking trojan that emerged in 2019, primarily designed to steal sensitive "financial information." While this sophisticated trojan is commonly distributed...
OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

OilRig Hackers Exploiting Microsoft Exchange Servers To Steal Login Details

OilRig hackers (aka Earth Simnavaz, APT34, OilRig) is a cyber espionage group that was linked to "Iranian" interests. This APT group primarily targets energy, governmental,...
Gmail Users Beware Of AI Scam that Takeovers Your Gmail Account

Gmail Users Beware Of AI Scam that Takeovers Your Gmail Account

A sophisticated new scam targeting Gmail users has emerged, using artificial intelligence to trick victims into surrendering control of their accounts. This "super realistic...
North Korean Hackers Attacking Job Seekers To Deploy Multiple Malware

North Korean Posing as Recruiters to Attack Job Seekers Device

Hackers target job seekers primarily for financial gain and to obtain sensitive personal information.  Many job seekers are vulnerable due to their enthusiasm for finding...
Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability, Cyber Attack & Other Stories

Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability, Cyber Attack & Other Stories

Welcome to this week's Cybersecurity Newsletter, bringing you the latest updates and insights from the world of cybersecurity. Stay informed and protected with our...
HashiCorp Cloud Vault Vulnerability

HashiCorp Cloud Vault Vulnerability Let Attackers Escalate Privileges

HashiCorp, a leading provider of cloud infrastructure automation software, has disclosed a critical security vulnerability in its Vault secret management platform. The flaw, identified as...
PureLogs Chrome Browser

PureLogs, Low Cost Infostealer Attacking Chrome Browser

The world of cyber threats is intricate and ever-changing. Threat actors are always improving their methods, and new strains of infostealer malware frequently surface. Infostealers...
SIEM as a Service

Recent Posts

Production Line Cameras Vulnerabilities Let Attackers Stop The Recordings

Critical security vulnerabilities have been identified in industrial camera systems widely deployed across Japanese manufacturing facilities, allowing malicious actors to remotely access live footage...