Malware

Kraken fileless attack technique abuses Microsoft Windows Error Reporting (WER)

An unidentified group of hackers is using a new fileless attack technique, dubbed Kraken, that abuses the Microsoft Windows Error…

5 years ago

New HEH botnet wipes devices potentially bricking them

A new botnet, tracked as HEH, discovered botnet implements a disk-wiping feature that allows it to wipe all data from…

5 years ago

CISA alert warns of Emotet attacks on US govt entities

The CISA agency is warning of a surge in Emotet attacks targeting multiple state and local governments in the US…

5 years ago

Fullz House hacked the website of Boom! Mobile provider to steal credit cards

The credit card skimming group Fullz House has compromised the website of US mobile virtual network operator (MVNO) Boom! Mobile. The…

5 years ago

Second-ever UEFI rootkit used in North Korea-themed attacks

A China-linked threat actor used UEFI malware based on code from Hacking Team in attacks aimed at organizations with an interest in…

5 years ago

SLOTHFULMEDIA RAT, a new weapon in the arsenal of a sophisticated threat actor

U.S. DoD and the DHS CISA agency published a malware analysis report for a new malware variant tracked as SLOTHFULMEDIA…

5 years ago

New Ttint IoT botnet exploits two zero-days in Tenda routers

Security researchers provided technical details about an IoT botnet dubbed Ttint that has been exploiting two zero-days in Tenda routers…

5 years ago

University Hospital New Jersey paid a $670K ransom

University Hospital New Jersey paid a $670,000 ransom this month to prevent the leak of 240 GB of stolen data,…

5 years ago

IPStorm botnet evolves to infect Android, Linux, and Mac devices

Researchers from Intezer reported that the IPStorm botnet has evolved to infect other operating systems, including Android, Linux, and Mac…

5 years ago

XDSpy APT remained undetected since at least 2011

Researchers from ESET uncovered the activity of a new APT group, tracked as XDSpy, that has been active since at…

5 years ago

This website uses cookies.