Category

Anti- Malware
Smoke Loader Malware just got heavier with PROPagate Injection
A malicious downloader malware called Smoke Loader, which sporadically infected victims since 2011, has gotten active this year with a new method to spread the infection to Windows users. Like most malware, it tricks the victim into downloading a sketchy Microsoft Word document from a spam invoice email with unknown sender, and then prompts the...
Continue Reading
The Rotexy Trojan: banker and blocker
On the back of a flood in Trojan movement, a standout amongst the most fascinating and dynamic examples to date was a mobile Trojan from the Rotexy family. In a three-month time span from August to October 2018, it propelled more than 70,000 assaults against clients found basically in Russia.   An intriguing component of...
Continue Reading
Nine Major Phishing Attacks of 2018
The subtle elements of phishing tricks change from year to year. Here, we will talk about phishing email models from a portion of the best phishing plans of 2018. 1. Record Verification Attachments as email bait from legitimate website poses from major company believing that some issue exist with your account.   2. Cloud-Based File...
Continue Reading
Clipboard Hijack
A new clipboard hijacking malware has been discovered this June, specifically targeting cryptocurrency credentials on matching accounts, mainly destination addresses, most notably for Bitcoin and Etherium users. So far, it has infected an estimated 300,000 computers worldwide, with a huge percentage running on Windows. In case you were wondering how this works, cryptocurrency transfers require...
Continue Reading
Google Images Plagued by Malwares
Cyber attackers are getting really creative and resourceful when it comes to infecting users and machines with Malwares. It’s as if regular hacking of websites and servers is not enough, these criminals are now targeting legit hosted websites and its images, and using them as a tool to exploit vulnerabilities while remaining undetected. What’s even...
Continue Reading
Dharma Ransomware weaponizes itself with fresh Cmb variant
While security experts are still not finish decrypting newer variants of Dharma ransomed files (which terrorizes the digital landscape with its prolific Ransomware releases lately), it again strikes back using a .cmb encryption. It appears as if this malicious malware is expected to surface for a while, for currently no decryption method is working as...
Continue Reading
Danabot Phishing Scam
Yet another sensational Phishing operation has been identified, and is targeting users with bogus bill statements from MYOB. MYOB (Mind Your Own Business) is a multinational corporation based in Australia. They provide taxation, accounting and other similar business services software to small and medium businesses. So its primary concentration of targets is of course, in...
Continue Reading
Bank Frauds detection and prevention
A fraudulent app impersonating a phone call recording functionality in the Google Play Store managed to take away thousands of euros from a couple of bank customers in Europe. The malicious app was planted in a QRecorder app, being advertised as an automatic call and voice recording tool. At the time of the analysis, it...
Continue Reading
Hotel Guest Fined for Hacking Hotel Wifi
A security engineer from Chinese multinational company Tencent hacked into the WiFi system of a hotel in Singapore and received a fine for publicly disclosing administrator login passwords. Zheng Dutao participated in the capture-the-flag competition during the Hack InThe Box security conference in Singapore at the end of August and decided to test the WiFi...
Continue Reading
Russian Fancy Bear Hacking Group Takes Advantage of UEFI Rootkit
What is the issue? Some of us are aware that in today’s generation cybercrime is rampant the same as how technology improves. UEFI is replacing BIOS as a firmware for most computers and mother boards. With the advancement of the firmware comes an exploit hackers can use. Once infected with this malware rootkit it will...
Continue Reading
1 2 3 5

Categories