malware

Tools for Conducting Malware Traffic Analysis in a Sandbox

A malware sandbox is a versatile solution that offers a variety of tools for studying malicious behavior, including threats’ network…

2 days ago

Chinese Hackers Compromised 20K FortiGate Systems worldwide

At the beginning of 2024, there were reports of Chinese threat actors targeting FortiGate systems with COATHANGER malware. However, it…

3 days ago

MultiRDP Malware Let Multiple Attackers Connect Via RDP at the Same Time

Threat actors use Remote Desktop Protocol (RDP) to gain unauthorized access to computers and networks, fully control systems, extract sensitive…

3 days ago

Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)

Our weekly summary of cybersecurity news provides information on the most recent threats, vulnerabilities, innovations, attacks, dangers, and stories in…

5 days ago

Beware of Fake Google Chrome Update Pop-Ups that Installs Malware

In the ever-changing cybersecurity landscape, a persistent threat appears in the form of a fake Chrome update.  Usually, these efforts…

6 days ago

Hackers Weaponize Authentication Tools To Deliver NiceRAT Malware via Botnet

Botnets, traditionally used for DDoS attacks with malware like Nitol, are now being built with malware capable of data exfiltration…

1 week ago

Massive Ticketmaster, Santander Data Breaches Linked to Snowflake Account Hacks

Hackers have claimed responsibility for a massive data breach involving Ticketmaster and Santander Bank, potentially affecting over 590 million accounts.…

2 weeks ago

Vidar Stealer Employs Advanced Tactics to Evade Defense Solutions

The Vidar Stealer has emerged as a potent and sophisticated malware, posing significant risks to both organizations and individuals. This…

2 weeks ago

New Meterpreter Backdoor Hides Malicious Codes Within the Image

ANY.RUN sandbox has analyzed a new strain of Meterpreter backdoor malware that leverages sophisticated steganography techniques to conceal its malicious…

2 weeks ago

Hackers Weaponizing Microsoft Office Documents to Deploy Malware in Business Environments

Microsoft Office allows one to generate a professional business report on office365 or write college essays, prepare CVs, take notes,…

2 weeks ago