Malware

A new highly evasive technique used to deliver the AsyncRAT Malware

Experts spotted a sophisticated malware campaign delivering the AsyncRAT trojan since September 2021. Researchers from Morphisec spotted a sophisticated phishing…

3 years ago

Experts analyze first LockBit ransomware for Linux and VMware ESXi

LockBit expands its operations by implementing a Linux version of LockBit ransomware that targets VMware ESXi servers. LockBit is the…

3 years ago

German intelligence agency warns of China-linked APT27 targeting commercial organizations

The BfV German domestic intelligence services warn of ongoing attacks carried out by the China-linked APT27 cyberespionage group. The Bun­des­amt…

3 years ago

New DeadBolt ransomware targets QNAP NAS devices

New malware is targeting targets QNAP NAS devices, it is the DeadBolt ransomware and ask 50 BTC for master key…

3 years ago

Segway e-store compromised in a Magecart attack to steal credit cards

Segway e-store suffered a Magecart attack that potentially allowed threat actors to steal credit cards and customer info. The online…

3 years ago

Sophisticated attackers used DazzleSpy macOS backdoor in watering hole attacks

Experts found an undocumented macOS backdoor, dubbed DazzleSpy, that was employed in watering hole attacks aimed at politically active individuals…

3 years ago

Latest version of Android RAT BRATA wipes devices after stealing data

A new version of the BRATA malware implements a functionality to perform a factory reset of the device to wipe…

3 years ago

Tens of AccessPress WordPress themes compromised as part of a supply chain attack

Threat actors planted a backdoor into multiple WordPress themes and plugins after compromising the website of their developer. In a…

3 years ago

Emotet spam uses unconventional IP address formats to evade detection

Experts warn Emotet malware campaign using "unconventional" IP address formats in an attempt to evade detection. Threat actors behind a…

3 years ago

Molerats cyberespionage group uses public cloud services as attack infrastructure

Cyberespionage group Molerats has been observed abusing legitimate cloud services, like Google Drive and Dropbox as attack infrastructure. Zscaler ThreatLabz…

3 years ago

This website uses cookies.