Category

Gaming

Gaming page 1

autodesk 3ds max malware injection plugin antimalware solution apt hackers

APT Hackers on Autodesk 3DS Max

A recent malware analysis report release for public knowledge in the cybercommunity was about exposing an APT group that plays as ‘hacker for hire’ for an unnamed company. Though rarely we heard the news about this type of activity, evidence shows that their target was an international designing company that works for a prominent real...
Continue Reading
chinese apt actors group hackers linux OS Advanced Persistent Threats

Collaborative attack between Chinese APT Actors on Linux

A collaborative attack has been unwrapped recently by cybersecurity experts that have been targeting the Linux Operating System. Developers such as Red Hat Enterprise, CentOS, and Debian are said to be the focus of this malicious attack. According to the uncovered pieces of evidence, the attack was perpetrated by 5 different Advanced Persistent Threats (APT)...
Continue Reading
lucifer malware linux botnet antimalware spear phishing email

Lucifer Malware on Linux

With its sudden popularity and discovery in May 2020, Lucifer botnet malware again makes noise within the Cybersecurity community. A new report has confirmed that the latest update of the malware becomes more lethal as this can now infect a network that uses the Linux Operating system. With it already being a powerful tool for...
Continue Reading
microsoft teamviewer vulnerability

High-risk vulnerability for TeamViewer has been rectified

A reportedly high-risk vulnerability of TeamViewer was recently discovered targeting Windows users, which, if exploited, could result in Cybercriminals stealing your system password and further exploitations. This attack does not require interaction from their victim as it can perform automatically.   About TeamViewer TeamViewer is a software application that is used for remote control, desktop...
Continue Reading
office 365 login fake page google ads bypasses security

Fake Office 365 login phishing bypasses security via Google Ads

A newly discovered campaign has been unraveled again, targeting the famous Microsoft Office 365 accounts. In the recent report of Cybersecurity experts, they unveiled the use of Google Ads and other related Google applications and Microsoft Platform such as Office 365 login pages as their current modus operandi tool for these adversaries to continue their...
Continue Reading
ransomware attack

Hackers lurk your network on a Ransomware attack

With the evidence gathered by Cybersecurity experts, they were able to conclude that even after the ransomware attack has been dealt, perpetrators continue its reconnaissance on their prey. As reported, on the recently concluded Maze Ransomware attack, a department Incident Report that circulates within the network of ST Engineering named VT San Antonio Aerospace (VT...
Continue Reading
microsoft domain takedown fraudsters malicious domains

Microsoft proactively took down COVID Domains

Domain Takedown by Microsoft With the numerous reports of Cybercrime that targeted many Office 365 accounts, Microsoft launched its mitigation plan to address such crisis, mainly as this fraudster uses Covid-19 themed attacks. As stipulated on their plea in the U.S. District Court for the Eastern District of Virginia, they were able to take down...
Continue Reading
invisimole malware cyberattack

The resurgence of the Invisimole Malware

It started in 2013 and then publicly exposed in 2018, and the Invisimole malware attack resurfaced again with a more sophisticated and stealthier comeback. The knowledge came from the collaborative effort of the compromised firm and cybersecurity experts of the ESET company. ESET confirmed through the evidence gathered from high military and diplomatic personnel organizations...
Continue Reading
trickbot ryuk ransomware malware payload timing

Trickbot and Ryuk Ransomware – Timing the payload

The timing of the payload Having the right timing results in a high success rate for any plan. Information Security experts from a private security firm, they were able to observe the ingenuity of using Ryuk ransomware with perfectly timing the payload. Based on the statistics, the patience of time given by the attacker with...
Continue Reading
Fxmsp corporate network access for sale

Fxmsp: Corporate network access for Sale

A collaborative investigation headed by the Cybersecurity experts from a trusted info-sec company confirmed that the Fxmsp hacker was able to profit 1.5 million dollars after auctioning exfiltrated corporate network access. There are about 135 businesses across 44 countries around the globe that got affected. This was continuously done within three years of activity by...
Continue Reading
1 2