Microsoft and cybersecurity firm FireEye has identified three new malware used by SolarWinds hackers in their last year’s attack on highly critical...
Dubbed Purple Lambert by Kaspersky; the malware passively listens to network traffic and search for a “magic packet.” The Global Research and...
CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency. It...
drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It takes...
Recently, a malware by the name of ACbackdoor has been discovered which infects both Windows and Linux based systems. With little to...
Researchers discovered a previously undetected multi-platform malware called ACbackdoor that has both Linux and Windows Variant to infect the respective users and...
Researchers detect a wave of malware campaigns from a new hacking group named TA2101 that targeting various organizations in German and Italy...
According to reports from digital forensics experts, the dangerous hacker group known as Platinum has announced the release of Titanium, a new...
A new wave of malware attack strikes again from the Titanium APT group that infects windows with hidden backdoor by mimicking common...
Platinum, the infamous Advanced Persistent Threat (APT) group, has launched a new backdoor trojan named Titanium that has advanced capabilities of taking...
A simple reverse shell written in python 3.7 just for fun. Actually it supports Windows and Linux OS and integrates some...
WordPress is probably the most popular content management system (CMS) today, so it’s no wonder it’s also the subject of multiple cybersecurity...
Hackers-Hack-Hackers: Russian APT group Turla known as Waterbug compromised the Iranian hacker’s command and control server infrastructure, and the Exfiltrated of data...
The activities of government-sponsored hacker groups can have disastrous consequences. A group of digital forensics experts from ESET has revealed the existence...
Even security companies are exposed to cyberattacks. IT system audit specialists report that security software developer Avast has become victim of an...
Digital forensics specialists report a new attack method consisting of the use of WAV audio files to hide and deliver backdoors and...
MasterMana botnet is part of an ongoing malware campaign. The IT security researchers at Prevailion have discovered an active botnet that has...
The US, UK, and Australia are putting pressure on Facebook to create a backdoor in its encrypted messaging apps that would allow...
Ethical hacking experts report that, in recent days, threat actors have been scanning the Internet looking for non updated SSL VPNs developed...
The RubyGems package repository maintenance team recently announced the removal of at least 18 malicious versions of 11 Ruby libraries due to...
Researchers discovered two new malicious hacking tools (BalkanRAT, BalkanDoor) from the ongoing campaign Balkans that act as a remote access trojan and...