Malware
SideWinder APT is A Growing Cyber Threat Targeting Critical Sectors
SideWinder APT, a highly sophisticated cyber espionage group, has been actively targeting maritime, nuclear, and IT sectors across South and Southeast Asia, the Middle East, and Africa. Initially known for attacks on... Read more
Eleven11bot Botnet: The Massive Cyber Threat Reshaping DDoS Attacks
A formidable cyber threat is making waves in the cybersecurity landscape. Dubbed Eleven11bot, this botnet has been identified as one of the largest distributed denial-of-service (DDoS) botnets seen in recent years.... Read more
Snake Keylogger Variant Will Steal All The Sensitive Data
A Persistent Information Stealer Targeting Windows Users Another emerged variant of Snake Keylogger has been detected actively targeting Windows users in multiple regions, including China, Turkey, Indonesia, Taiwan,... Read more
Google Tag Manager Exploit Comes To Threaten The E-Commerce Security
A Hidden Threat Lurking in Website Scripts Cybercriminals are continuously adapting their methods, and one of the latest tactics involves the misuse of Google Tag Manager (GTM) to carry out attacks against online... Read more
forceCopy Stealer: The Sneaky Threat Targeting Web Browser Data
A New Tool in a Notorious Hacking Group’s Arsenal Cybersecurity experts have uncovered a sophisticated cyber threat known as forceCopy Stealer, an information-gathering tool deployed in targeted attacks. This stealer... Read more
MintsLoader Malware: A Different Breed of Stealthy Threats
The digital landscape continues to bring new challenges to organizations and individuals striving to secure their systems. Among such cyber threats is MintsLoader, a sophisticated malware loader that has garnered... Read more
EncryptRAT: The Cyber Threat Organizations Must Watch
EncryptHub, a financially motivated hacking group, has been refining its approach to cyberattacks. Their latest development, EncryptRAT, is a tool designed to expand their capabilities, raising new concerns among... Read more
Havoc Malware Could Easily Hide In Plain Sight
Cyber attackers constantly find new ways to evade detection and exploit unsuspecting users. One such threat making waves is Havoc, an open-source command-and-control (C2) framework that has been leveraged in a... Read more
StaryDobry Attack: The Threat Exploiting Gaming Enthusiasts
A Deceptive Scheme Targeting Gamers The StaryDobry attack is a large-scale campaign that leveraged the popularity of simulation and physics-based video games to infiltrate systems with a hidden cryptocurrency miner.... Read more
DragonRank SEO Attack: The Hidden Manipulation of IIS Servers
A Sophisticated Strategy to Exploit Search Rankings The DragonRank SEO Attack is a campaign observed targeting Internet Information Services (IIS) servers, particularly in parts of Asia and Brazil. The objective of... Read more
FERRET Malware: A Sophisticated Threat Masquerading as Job Interviews
A Deceptive Recruitment Scheme Cybercriminals continuously refine their strategies to exploit unsuspecting individuals, and one recent example is the emergence of FERRET malware. This sophisticated collection of... Read more
AIRASHI Botnet: A Complex Cyber Threat Targeting IoT Devices
The AIRASHI botnet stands out as a sophisticated example of how threat actors are leveraging vulnerabilities in Internet of Things (IoT) devices to orchestrate large-scale attacks. This botnet, a derivative of the... Read more
Sagerunex Malware Variants: A Closer Look at the Evolving Cyber Threat
Cybersecurity researchers have uncovered new developments in the ongoing activities of the hacking group known as Lotus Panda. This threat actor, believed to have ties to China, has been actively targeting government,... Read more
GitVenom Malware: A Deceptive Threat Hiding in Open-Source Projects
The Deceptive Face of GitVenom Malware Cybercriminals have found an insidious way to exploit trust in open-source platforms, using GitHub to distribute malicious software disguised as legitimate projects. Dubbed... Read more
whoAMI Attack: A Name Confusion Tactic Targeting AWS Environments
A Threat to Cloud Security Cybersecurity researchers have uncovered a name confusion technique dubbed the whoAMI attack, which enables individuals to manipulate Amazon Web Services (AWS) environments by publishing... Read more
SparkCat Malware: A Mobile Crypto Wallet Threat
Disguised Apps Target Cryptocurrency Wallets A threat known as SparkCat Malware has been found infiltrating both Apple and Google app stores. This campaign employs fraudulent applications to collect sensitive... Read more
Aquabot Botnet: Another Player in the DDoS Threat Landscape
Understanding Aquabot Botnet Aquabot is a botnet built on the Mirai framework, a well-known malware strain used to take control of internet-connected devices for disruptive cyber activities. Since its emergence in... Read more
PlushDaemon APT Group: A Dive into a Covert Cyber Operation
Unveiling a Sophisticated Cyber Threat PlushDaemon, an advanced persistent threat (APT) group with links to China, represents a sophisticated player in cyber espionage. This group has drawn attention for its targeted... Read more