Security
Threat Actors Use Trojanized Super Mario 3 Game Installer to Spread Malware
Security researchers at Cyble found that the threat actors are distributing an altered Super Mario 3: Mario Forever installer sample as a self-extracting archive executable through undisclosed…
Massive Data Breach: Over 100K Chat GPT Accounts Stolen, Warns Group IB
Cybersecurity researchers at Group IB reported that they had spotted more than a hundred thousand information Stealer logs on several underground websites containing Chat GPT accounts. For…
Russian Hacker Group Shuckworm Still Targeting Ukraine Security Orgs
Security analysts at Symantec, a part of Broadcom, reported that the Russian state-funded hacker group Gamaredon aka Shuckworm, is still targeting Ukraine's security organizations, such as military…
BlackCAT Ransomware Group Pushes Malicious Installers via Malvertising
Security researchers at Trend Micro discovered that the BlackCAT, also known as ALPHV, is running malware-filled advertisement activities to entice people into fake websites that look like…
Russian Threat Actors Target Cryptocurrency with Enigma Malware
Threat Actors from Russia are running a campaign that targets East Europeans working in the cryptocurrency industry by using fake job offers and aiming to infect the…
New Royal Trojan Variant Discovered, Targets VMware ESXi Virtual Machines
A security researcher named Will Thomas at Equinix Threat Analysis Centre (ETAC) discovered a new variant of the Royal Trojan which is performed using a command line.…
Mimic Ransomware Uses ‘Everything’ API to Target English and Russian Windows Users
Security researchers at Trend Micro are back with the discovery of a new ransomware which the researchers named Mimic, that takes advantage of APIs of the Everything…
Attackers Abusing OneNote Attachments to Spread RAT Malware
Over the years, Threat actors have been deploying malware in emails via malicious Microsoft Word and Excel attachments, which then launch macros to download & install the…
Cybercriminals Selling ‘Hook’ Android Malware for Remote Control of Smartphones
In a report by ThreatFabric, An Android Malware by the name of ‘Hook’ is being sold by cybercriminals who brag that it can remotely take control of…
Hackers Breach CircleCi’s Systems via Engineer’s Infected 2FA-Backed SSO
CircleCi, a popular CI/CD (Continuous Integration & Continuous Development) platform used for DevOps practices revealed that it suffered a security exploit. In December last year, an engineer…
6 Malicious PyPi Packages Installing RAT Malware via Cloudflare Tunneling
A team of researchers at Phylum security firm discovered six malicious packages on the Python Package Index, which were found installing Information stealing and Remote access trojan…
Attackers Copying Legit Software Sites to Spread Malware via Google Ads Platform
There has been an increase in the number of threat actors abusing the Google Ads platform to distribute malware to unaware users who are looking to download…
RisePro Malware Stealing Passwords, Credit Card Info & Cryptocurrency Wallets
A new malware that steals information named RisePro has been found and is being spread through the fake cracked websites operated by the PrivateLoader (Pay Per Install),…
Attackers Exploit a Flaw in YTTH WooCommerce Gift Card Premium Plugin
A critical flaw in the YTTH WooCommerce Gift Cards Premium plugin is being diligently exploited by attackers. Well, it's a plugin that the website’s owners use to…
Godfather Android Malware Stealing Bank Websites & Crypto Exchanges’ Data
A group of IB analysts at Threat Fabric have discovered an Android malware named Godfather, which has been trying to steal the credentials of over 400 banking…
Muddy Water, a Hacker Group Used Compromised Corporate Emails for Sending Phishing Messages
The Researchers at Deep Instincts found out that a hacker group named Muddy Water, which has been linked with the Ministry of Intelligence and security of Iran…
End of content
No more pages to load