Home Search
malware - search results
If you're not happy with the results, please do another search
Lazarus Hackers Installing Windows Rootkit Using Dell Driver Bug
An attack utilizing the BYOVD (Bring Your Own Vulnerable Driver) method was observed recently by the experts at ESET. In this attack, the North...
Hackers Targeting Multiple Military & Weapons Contractor Companies Using Powershell Stagers
Securonix Threat Labs has identified a new covert attack campaign targeting Military and Weapons Contractor companies including an F-35 Lightning II fighter aircraft components...
Warning!! New WhatsApp Zero-Day Bug Let Hackers Control The App Remotely
Two critical zero-day vulnerability that WhatsApp had been known to exploit was silently fixed by WhatsApp. As a result of these security flaws, attackers...
FARGO Ransomware Attacks MS-SQL Servers To Encrypt Internet Services
Cybersecurity experts at the ASEC (AhnLab Security Emergency Response Center) analysis team have recently warned that Microsoft SQL servers that are vulnerable to attacks...
Hackers Weaponize PuTTY SSH Client to Deploy Backdoors & Establish Communication Over WhatsApp
The adversaries from North Korea are deploying critical backdoors on the devices of targets by using trojanized versions of the PuTTY SSH client. Posing...
How Do You Defend Against Software Supply Chain Attacks?
A supply chain attack occurs when an outsider gains access to your system through an external entity or source. Organizations' vulnerability can happen through...
5 Things You Can Do Today to Increase Your Cybersecurity
There are a few things that you should do today rather than tomorrow when it comes to your cybersecurity. There are quite a few...
Two-Year Long DangerousSavanna Campaign Attack Financial and Banking Institutions
Over the past two years, a persistent malicious campaign dubbed "DangerousSavanna" has targeted major financial institutions and insurance companies.
In Central and Western Africa, more...
North Korean APT Group Attacking Corporate Networks of Energy Providers
Lazarus (APT38), the North Korean APT group is attacking the corporate networks of energy providers by exploiting the VMWare Horizon servers.
While the corporate networks...
Five Tips to Protect Your Transactions: How to Avoid Fraud
It seems that every time we turn around, there's a new way for fraudsters to steal our hard-earned money. In this blog post, we're...