A new malware campaign that delivers Emotet Malware Via Microsoft Office documents attachments with “Greeting Card” as the document name. Attackers targeted...
An NSO Group ex employee, one of the most powerful hacking companies in the world, has been arrested and charged for stealing...
Pentest specialists discovered a malware piece that infects systems with ransomware cryptocurrency mining programs, depending on equipment specifications and configuration, to decide which...
Pentest specialists report that Hamas has been accused of leading an elaborated spyware operation designed to involve Israeli Defense Force (IDF) soldiers to...
Cybercriminals using a malicious macro that changes the target of Desktop Shortcuts to download malware and when the user clicks on the...
A researcher discovered new double Zero-day exploit that affected Adobe Acrobat, Reader and older Windows 7 platforms, Windows Server 2008. This critical Zero-Day...
Hackers targeting Cryptocurrency users On Slack and Discord chat platforms with MACOS Malware dubbed OSX.Dummy. The malware targeted users in crypto related...
Newly discovered cryptocurrency mining bot targeting the Internet of Things (IoT) devices which contain SSH service and IoT-related ports, including 22, 2222,...
Powerful Python based adware called PBot (PythonBot) went beyond the adware limits, it installs and runs malicious hidden miner on the victim’s computer....
A new malware was discovered on sale for the amount of 50 dollars in its beta version, but promising the possibility of...
A new Cyber Espionage Group dubbed RANCOR identified targeting South East Asia using new malware families PLAINTEE and DDKONG. The RANCOR group...
Necurs botnet malware emerging again with new set of futures to create a backdoor on victims machine to steal sensitive data and...
Over 60,000 Android devices are infected with malicious Battery Saver app that is capable of stealing sensitive information from victims and generating...
Newly uncovered complex MyloBot Botnet incorporates different malicious techniques and ability to shut down the Windows Defender and Windows Updates. Basically, botnet do...
Sophisticated Malware called GZipDe distributed through the Weaponized malicious document and installed the Metasploit backdoor in targeted victims computer. Metasploit is a powerful...
Cyber criminals spreading new Android Malware called FakeSpy to compromise the infected Android users to stealing text messages, account information, contacts, and...
Kardon Loader advertised in underground markets as an open beta product for sale the standalone built cost $50 and with separate charges for...
Chinese Cyber Espionage Group Thrip targets contractors that develop software for satellite communications, Telecoms, and Defense sectors. Attackers used a combination of...
Olympic Destroyer Malware raised again through weaponized documents and currently targeting various Financial Organization with upgraded capabilities and evade the detection of...
A new family of Android RAT spotted in wild abusing the Telegram protocol for command & control and data exfiltration. Attackers distributing...
Zacinlo malware has been targeting Windows devices since 2012. A newly uncovered form of stealthy and persistent malware is distributing adware to...