SIEM as a Service
Home Search

malware - search results

If you're not happy with the results, please do another search

Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN

A server briefly linked to the notorious KeyPlug malware has inadvertently exposed a comprehensive arsenal of exploitation tools specifically designed to target Fortinet firewall...

Researchers Uncovered The Stealthy StrelaStealer Malware Tactics, Techniques, and Procedures

This malicious software specifically targets email credentials from popular clients such as Microsoft Outlook and Mozilla Thunderbird, creating significant security risks for organizations worldwide. The...

New XorDDoS Malware Allows Attackers to Create Sophisticated DDoS Bot Network

A significant evolution in distributed denial-of-service (DDoS) malware has been detected, with the latest version of XorDDoS continuing to spread globally between November 2023...
Hackers Weaponize MMC Script to Deploy MysterySnail RAT Malware

Hackers Weaponize MMC Script to Deploy MysterySnail RAT Malware

A sophisticated cyberespionage campaign leveraging malicious Microsoft Management Console (MMC) scripts to deploy the stealthy MysterySnail remote access trojan (RAT).  First identified in 2021 during...

Agent Tesla Malware Employs Multi-Stage Attacks Using PowerShell Scripts

Security researchers have identified a sophisticated malware campaign utilizing Agent Tesla variants delivered through elaborate multi-stage attack sequences. The malware operation, discovered in mid-April 2025,...

Researchers Uncovered Gamaredon’s PteroLNK VBScript Malware Infrastructure & TTP’s

A sophisticated malware campaign attributed to the Russia-linked Gamaredon threat group has been actively targeting Ukrainian entities since late 2024, according to new research...

Mustang Panda Employs Using Weaponized RAR Archives to Install New ToneShell Malware

Security researchers have uncovered new malicious activities attributed to Mustang Panda, a China-sponsored espionage group known for targeting government entities, military organizations, and non-governmental...

Beware of Online PDF Converters That Tricks Users to Install Password Stealing Malware

Cybercriminals have launched a sophisticated malware campaign leveraging fake PDF-to-DOCX converter websites that mimic the popular legitimate service PDFCandy. The malicious websites, including domains such...
Malware Tactics Used To Evade Detection

3 Malware Tactics Used To Evade Detection By Corporate Security: See Examples 

Some threats don’t kick down the door; they slip in, stay quiet, and wait.  These days, attackers are playing the long game, using evasion techniques...

Chinese Hackers Using New BRICKSTORM Malware to Attack Windows & Linux Machines

Cybersecurity experts have uncovered a sophisticated backdoor malware called BRICKSTORM being deployed by Chinese state-aligned hackers against European industries of strategic importance. The malware, linked...
SIEM as a Service

Recent Posts