Tech support scammers are tricking people to install ransomware and later...
A Microsoft security team has been closely monitored a cybercriminal group identified as BazarCall, dedicated to the deployment of tech support scams using call centers for the distribution of a...
View ArticleNetfilter gaming driver is a Chinese backdoor approved by Microsoft....
In a recent statement, Microsoft confirmed that Netfilter, a malicious driver distributed within some gaming environments, was signed by the company. Karsten Hahn, researcher at security firm G Data,...
View ArticleWorld’s richest hacker group now focusing on Linux and NAS devices with new...
A recent report notes that REvil ransomware operators are now employing a Linux encryption tool to start attacking virtual machines like VMware ESXi. This could be an especially prolific time for...
View ArticleWhy everybody wants XLoader, the new malware with remote access, keystroke...
A recent report from Check Point Research (CPR) points to the detection of a new malware variant designed to infect Windows and macOS devices. This malware was identified as XLoader and is for sale...
View ArticleThese 13 malware variants are used to hack and take control of Pulse Secure...
In its most recent report, the Cybersecurity and Infrastructure Security Agency (CISA) alerted users of Pulse Secure devices to the discovery of at least 13 malware samples found on affected devices....
View ArticleDon’t pay Babuk ransomware hackers; their decryptor doesn’t work and hackers...
A McAfee security report notes that Babuk ransomware operators have been implementing some new attack mechanisms to infect Linux, UNIX, and VMware systems, which would allow for the engagement of...
View ArticleAndroid malware Vultur uses VNC remote access to steal passwords
Cybersecurity specialists report the detection of a new Android-based remote access Trojan (RAT) that is capable of recording the screen of the affected user in order to steal sensitive information...
View ArticlePrometheus: the hacking platform that helps cybercriminals to attack as many...
A new cybercriminal operation identified as Prometheus is helping multiple hacking groups distribute malware across various compromised websites. Researchers point out that Prometheus operates a...
View ArticleLockbit ransomware hacks Accenture, encrypts 2,500 computers, steals 6 TB of...
Tech firm Accenture has confirmed that its systems were compromised by a ransomware attack allegedly deployed by LockBit 2.0 operators. In addition to encrypting thousands of files, hackers threaten...
View ArticleThe Mozi IoT botnet evolved to gain persistence on Netgear, Huawei, and ZTE...
Cybersecurity specialists report the detection of a new version of the Mozi botnet that is now capable of manipulating the web traffic of the affected implementations using DNS spoofing techniques and...
View ArticleCybercriminals are signing malware in new way to prevent detection: new...
The experts of Google Threat Analysis Group, specialized in the investigation of state hacking campaigns, electronic fraud and disinformation, report the detection of a new evasion technique used by...
View ArticleGhostEmperor: New Chinese virus to take control of your devices and make you...
A report presented by Kaspersky Labs experts points to the detection of a Chinese cyberespionage group that has attacked multiple targets in South Asia since mid-2020. Identified as GhostEmperor,...
View ArticleFontOnLake: a killer backdoor cocktail with a rootkit for Linux
Cybersecurity specialists report the detection of a new malware family that is hidden in legitimate binaries for the infection of Linux systems. Identified as FontOnLake, this set of malicious tools...
View Article3 malicious npm JavaScript libraries recently discovered can install crypto...
The developers of Sonatype, an automated malware detection system, report the finding of a set of malicious packages in the npm registry; According to the report, these malicious payloads are hidden...
View ArticleLargest botnet with control of millions of devices discovered. THE PINK BOTNET
Researchers from the firm Netlab Cybersecurity report the detection of a massive new botnet capable of launching powerful denial of service (DoS) attacks thanks to the detection of more than 1.5...
View ArticleNew research: Millions of Huawei smartphones are inflected with malware
Specialists from the security firm Dr Web report the detection of multiple applications infected with malware in AppGallery, the official application store for Huawei devices. The apps are infected...
View ArticleTardigrade: The new malware that only targets medicine and vaccine...
According to the Bioeconomy Information Sharing and Analysis Center (BIO-ISAC), multiple facilities dedicated to the manufacture and development of drugs are being attacked by a new malware variant...
View ArticleYouTube search of free games show Trojan links. Be careful when trying out...
During the Christmas season, the risks of cyberattack increase for multiple targets, including the gamer community. Cybersecurity experts report that this is because several developers decide to...
View Article17 malicious packages in the Node.js package manager (npm) code repository...
Cybersecurity specialists report the detection of a set of malicious packages in Node.js package manager repository (npm) designed to collect Discord tokens and eventually take control of the affected...
View ArticleThis 12Kb-sized ransomware can exploit Log4j critical vulnerability and...
For days now, the cybersecurity community has been following the active exploitation of CVE-2021-44228, a critical vulnerability in the Log4j log library. Among the multiple reports that have appeared...
View Article