Cyber Crime

GuLoader implements new evasion techniquesGuLoader implements new evasion techniques

GuLoader implements new evasion techniques

Cybersecurity researchers exposed new evasion techniques adopted by an advanced malware downloader called GuLoader. CrowdStrike researchers d a detailed multiple evasion…

3 years ago
Updated: Data of 400 Million Twitter users up for saleUpdated: Data of 400 Million Twitter users up for sale

Updated: Data of 400 Million Twitter users up for sale

A threat actor is claiming they have obtained data of 400,000,000 Twitter users and is offering it for sale. A…

3 years ago
Raspberry Robin malware used in attacks against Telecom and GovernmentsRaspberry Robin malware used in attacks against Telecom and Governments

Raspberry Robin malware used in attacks against Telecom and Governments

The Raspberry Robin worm attacks aimed at telecommunications and government office systems across Latin America, Australia, and Europe. Researchers from Trend Micro…

3 years ago
BetMGM discloses security breach impacting 1.5 Million customersBetMGM discloses security breach impacting 1.5 Million customers

BetMGM discloses security breach impacting 1.5 Million customers

Online sports betting company BetMGM suffered a data breach and threat actors offered for sale a database containing the data…

3 years ago
Vice Society ransomware gang is using a custom lockerVice Society ransomware gang is using a custom locker

Vice Society ransomware gang is using a custom locker

The Vice Society ransomware group has adopted new custom ransomware, with a strong encryption scheme, in recent intrusions. SentinelOne researchers…

3 years ago
A new Zerobot variant spreads by exploiting Apache flawsA new Zerobot variant spreads by exploiting Apache flaws

A new Zerobot variant spreads by exploiting Apache flaws

Microsoft spotted an upgraded variant of the Zerobot botnet that spreads by exploiting Apache vulnerabilities. Microsoft Threat Intelligence Center (MSTIC)…

3 years ago
Play ransomware attacks use a new exploit to bypass ProxyNotShell mitigations on Exchange serversPlay ransomware attacks use a new exploit to bypass ProxyNotShell mitigations on Exchange servers

Play ransomware attacks use a new exploit to bypass ProxyNotShell mitigations on Exchange servers

Play ransomware attacks target Exchange servers with a new exploit that bypasses Microsoft’s ProxyNotShell mitigations. Play ransomware operators target Exchange…

3 years ago
Malicious PyPI package posed as SentinelOne SDK to serve info-stealing malwareMalicious PyPI package posed as SentinelOne SDK to serve info-stealing malware

Malicious PyPI package posed as SentinelOne SDK to serve info-stealing malware

Researchers spotted a malicious package in the Python Package Index (PyPI) repository that impersonates a software development kit (SDK) for…

3 years ago
Experts spotted a variant of the Agenda Ransomware written in RustExperts spotted a variant of the Agenda Ransomware written in Rust

Experts spotted a variant of the Agenda Ransomware written in Rust

Researchers spotted a new variant of the Agenda ransomware which is written in the cross-platform programming language Rust. Trend Micro…

3 years ago
US Gov warns of BEC attacks to hijack shipments of food productsUS Gov warns of BEC attacks to hijack shipments of food products

US Gov warns of BEC attacks to hijack shipments of food products

US government is warning of business email compromise (BEC) attacks aimed at hijacking shipments of food products and ingredients. The…

3 years ago