A Malicious Software Downloader called ICLoader through Popup Ads and over hundreds of websites are pushing various PUA such as Botnets, cryptocurrency …
Telegram Bot API Abused by TeleRAT Android Malware and Steal Sensitive Data from Android Phone
A Newly Discovered Andoird Malware called TeleRAT are abused Telegram Bot API that used to command and control the malicious …
Cybercrime-as-a-Service – DDoS Attack Services Available in Dark Web Markets for $10 per Hour
The number of cyberattacks is increasing and cybercriminal evolving with new business models such as Cybercrime-as-a-service. Recent studies indicate cybercrime’s cost …
Cybercriminals Exploit PHP Weathermap Vulnerability to Install Cryptocurrency Miner on Linux Servers
An active cryptocurrency mining campaign targeting Linux servers via PHP Weathermap Vulnerability to deploy cryptocurrency mining malware. The campaign uses …
Fakebank Malware Variant that Intercepts Android user’s Banking Calls
The Fakebank malware comes back, with its new Fakebank malware variant that intercepts the Android users’ banking incoming and outgoing …
Hermes Ransomware Distributed Through Malicious Office Documents Embedded Flash Exploit
After the public announcement of flash vulnerability CVE-2018-4878 massive malspam campaigns pumped up with malicious word documents that contain flash …
Chinese Cyber Espionage Group Targeting United States Engineering & Academic Organizations With Advanced Hacking Tools
Chinese cyber espionage actor actively distributing TEMP.Periscope malware campaign that used for set of powerful malware toolkit to compromise U.S …
Cyber Espionage Campaign Possibly “MuddyWater” Targets Middle East and Central Asia
A new campaign with the similarities of MuddyWater spotted targetting organizations in Pakistan, Turkey, and Tajikistan. Attackers use various social …
With New Bankshot Malware Cybercrime Group Hidden Cobra Targets Financial Sectors
Hidden Cobra cybercrime group continues to target multiple industries and financial sectors. With this new aggressive campaign, the group implanted …
Researchers bypassed Windows 10 Lock Protection and Access Cortana Voice Commands that leads to Install Malware
The researcher discovered a new flaw in Windows 10 lock Protection that allows attackers to access the Cortana Voice Commands …