Malware

Security
Jan 28, 2023

Mimic Ransomware Uses ‘Everything’ API to Target English and Russian Windows Users

Security researchers at Trend Micro are back with the discovery of a new ransomware which the researchers named Mimic, that takes advantage of APIs of the Everything…
Phishing
Jan 24, 2023

Attackers Abusing OneNote Attachments to Spread RAT Malware

Over the years, Threat actors have been deploying malware in emails via malicious Microsoft Word and Excel attachments, which then launch macros to download & install the…
Cyber Security
Jan 21, 2023

Cybercriminals Selling ‘Hook’ Android Malware for Remote Control of Smartphones

In a report by ThreatFabric, An Android Malware by the name of ‘Hook’ is being sold by cybercriminals who brag that it can remotely take control of…
Malware
Jan 9, 2023

6 Malicious PyPi Packages Installing RAT Malware via Cloudflare Tunneling

A team of researchers at Phylum security firm discovered six malicious packages on the Python Package Index, which were found installing Information stealing and Remote access trojan…
Phishing
Dec 30, 2022

Attackers Copying Legit Software Sites to Spread Malware via Google Ads Platform

There has been an increase in the number of threat actors abusing the Google Ads platform to distribute malware to unaware users who are looking to download…
Malware
Dec 27, 2022

RisePro Malware Stealing Passwords, Credit Card Info & Cryptocurrency Wallets

A new malware that steals information named RisePro has been found and is being spread through the fake cracked websites operated by the PrivateLoader (Pay Per Install),…
Cyber Security
Dec 22, 2022

Godfather Android Malware Stealing Bank Websites & Crypto Exchanges’ Data

A group of IB analysts at Threat Fabric have discovered an Android malware named Godfather, which has been trying to steal the credentials of over 400 banking…
Malware
Dec 1, 2022

A37 Group’s Dolphin Malware Used to Steal Data & Target South Korean Paper

Security Researchers at the ESET firm discovered an unknown backdoor they named "Dolphin," which has been used by North Korean hackers in highly aimed operations for more…

End of content

No more pages to load