Home Search
malware - search results
If you're not happy with the results, please do another search
Hackers Abuse EDRSilencer Red Team Tool To Evade Detection
EDRSilencer is a tool designed to enhance data privacy and security by "silencing" or "blocking" unwanted data transmissions from endpoints.
The tool is likely used...
Hackers Using Bitbucket Code Hosting Platform To Host Malicious Payloads
Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting Bitbucket, a popular code hosting platform, to deliver dangerous payloads to unsuspecting victims.
The attackers...
SideWinder APT Hackers Added New Post-Exploitation Toolkit to Their Arsenal
Security researchers at Kaspersky have uncovered a significant expansion in the capabilities of the SideWinder advanced persistent threat (APT) group.
In a report published...
ErrorFather Hackers Attacking Android Users To Take Control Of The Device
Cerberus is an advanced Android banking trojan that emerged in 2019, primarily designed to steal sensitive "financial information."
While this sophisticated trojan is commonly distributed...
OilRig Hackers Exploiting Microsoft Exchange Servers To Steal Login Details
OilRig hackers (aka Earth Simnavaz, APT34, OilRig) is a cyber espionage group that was linked to "Iranian" interests.
This APT group primarily targets energy, governmental,...
Gmail Users Beware Of AI Scam that Takeovers Your Gmail Account
A sophisticated new scam targeting Gmail users has emerged, using artificial intelligence to trick victims into surrendering control of their accounts.
This "super realistic...
North Korean Posing as Recruiters to Attack Job Seekers Device
Hackers target job seekers primarily for financial gain and to obtain sensitive personal information.
Many job seekers are vulnerable due to their enthusiasm for finding...
Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability, Cyber Attack & Other Stories
Welcome to this week's Cybersecurity Newsletter, bringing you the latest updates and insights from the world of cybersecurity. Stay informed and protected with our...
HashiCorp Cloud Vault Vulnerability Let Attackers Escalate Privileges
HashiCorp, a leading provider of cloud infrastructure automation software, has disclosed a critical security vulnerability in its Vault secret management platform.
The flaw, identified as...
PureLogs, Low Cost Infostealer Attacking Chrome Browser
The world of cyber threats is intricate and ever-changing. Threat actors are always improving their methods, and new strains of infostealer malware frequently surface.
Infostealers...