Malware

SideWinder APT is A Growing Cyber Threat Targeting Critical Sectors screenshot

SideWinder APT is A Growing Cyber Threat Targeting Critical Sectors

SideWinder APT, a highly sophisticated cyber espionage group, has been actively targeting maritime, nuclear, and IT sectors across South and Southeast Asia, the Middle East, and Africa. Initially known for attacks on... Read more

March 11, 2025
Eleven11bot Botnet: The Massive Cyber Threat Reshaping DDoS Attacks screenshot

Eleven11bot Botnet: The Massive Cyber Threat Reshaping DDoS Attacks

A formidable cyber threat is making waves in the cybersecurity landscape. Dubbed Eleven11bot, this botnet has been identified as one of the largest distributed denial-of-service (DDoS) botnets seen in recent years.... Read more

March 5, 2025
Snake Keylogger Variant Will Steal All The Sensitive Data screenshot

Snake Keylogger Variant Will Steal All The Sensitive Data

A Persistent Information Stealer Targeting Windows Users Another emerged variant of Snake Keylogger has been detected actively targeting Windows users in multiple regions, including China, Turkey, Indonesia, Taiwan,... Read more

February 21, 2025
Google Tag Manager Exploit Comes To Threaten The E-Commerce Security screenshot

Google Tag Manager Exploit Comes To Threaten The E-Commerce Security

A Hidden Threat Lurking in Website Scripts Cybercriminals are continuously adapting their methods, and one of the latest tactics involves the misuse of Google Tag Manager (GTM) to carry out attacks against online... Read more

February 12, 2025
forceCopy Stealer: The Sneaky Threat Targeting Web Browser Data screenshot

forceCopy Stealer: The Sneaky Threat Targeting Web Browser Data

A New Tool in a Notorious Hacking Group’s Arsenal Cybersecurity experts have uncovered a sophisticated cyber threat known as forceCopy Stealer, an information-gathering tool deployed in targeted attacks. This stealer... Read more

February 7, 2025
MintsLoader Malware: A Different Breed of Stealthy Threats screenshot

MintsLoader Malware: A Different Breed of Stealthy Threats

The digital landscape continues to bring new challenges to organizations and individuals striving to secure their systems. Among such cyber threats is MintsLoader, a sophisticated malware loader that has garnered... Read more

January 27, 2025
EncryptRAT: The Cyber Threat Organizations Must Watch screenshot

EncryptRAT: The Cyber Threat Organizations Must Watch

EncryptHub, a financially motivated hacking group, has been refining its approach to cyberattacks. Their latest development, EncryptRAT, is a tool designed to expand their capabilities, raising new concerns among... Read more

March 7, 2025
Havoc Malware Could Easily Hide In Plain Sight screenshot

Havoc Malware Could Easily Hide In Plain Sight

Cyber attackers constantly find new ways to evade detection and exploit unsuspecting users. One such threat making waves is Havoc, an open-source command-and-control (C2) framework that has been leveraged in a... Read more

March 4, 2025
StaryDobry Attack: The Threat Exploiting Gaming Enthusiasts screenshot

StaryDobry Attack: The Threat Exploiting Gaming Enthusiasts

A Deceptive Scheme Targeting Gamers The StaryDobry attack is a large-scale campaign that leveraged the popularity of simulation and physics-based video games to infiltrate systems with a hidden cryptocurrency miner.... Read more

February 20, 2025
DragonRank SEO Attack: The Hidden Manipulation of IIS Servers screenshot

DragonRank SEO Attack: The Hidden Manipulation of IIS Servers

A Sophisticated Strategy to Exploit Search Rankings The DragonRank SEO Attack is a campaign observed targeting Internet Information Services (IIS) servers, particularly in parts of Asia and Brazil. The objective of... Read more

February 11, 2025
FERRET Malware: A Sophisticated Threat Masquerading as Job Interviews screenshot

FERRET Malware: A Sophisticated Threat Masquerading as Job Interviews

A Deceptive Recruitment Scheme Cybercriminals continuously refine their strategies to exploit unsuspecting individuals, and one recent example is the emergence of FERRET malware. This sophisticated collection of... Read more

February 5, 2025
AIRASHI Botnet: A Complex Cyber Threat Targeting IoT Devices screenshot

AIRASHI Botnet: A Complex Cyber Threat Targeting IoT Devices

The AIRASHI botnet stands out as a sophisticated example of how threat actors are leveraging vulnerabilities in Internet of Things (IoT) devices to orchestrate large-scale attacks. This botnet, a derivative of the... Read more

January 23, 2025
Sagerunex Malware Variants: A Closer Look at the Evolving Cyber Threat screenshot

Sagerunex Malware Variants: A Closer Look at the Evolving Cyber Threat

Cybersecurity researchers have uncovered new developments in the ongoing activities of the hacking group known as Lotus Panda. This threat actor, believed to have ties to China, has been actively targeting government,... Read more

March 6, 2025
GitVenom Malware: A Deceptive Threat Hiding in Open-Source Projects screenshot

GitVenom Malware: A Deceptive Threat Hiding in Open-Source Projects

The Deceptive Face of GitVenom Malware Cybercriminals have found an insidious way to exploit trust in open-source platforms, using GitHub to distribute malicious software disguised as legitimate projects. Dubbed... Read more

February 26, 2025
whoAMI Attack: A Name Confusion Tactic Targeting AWS Environments screenshot

whoAMI Attack: A Name Confusion Tactic Targeting AWS Environments

A Threat to Cloud Security Cybersecurity researchers have uncovered a name confusion technique dubbed the whoAMI attack, which enables individuals to manipulate Amazon Web Services (AWS) environments by publishing... Read more

February 17, 2025
SparkCat Malware: A Mobile Crypto Wallet Threat screenshot

SparkCat Malware: A Mobile Crypto Wallet Threat

Disguised Apps Target Cryptocurrency Wallets A threat known as SparkCat Malware has been found infiltrating both Apple and Google app stores. This campaign employs fraudulent applications to collect sensitive... Read more

February 10, 2025
Aquabot Botnet: Another Player in the DDoS Threat Landscape screenshot

Aquabot Botnet: Another Player in the DDoS Threat Landscape

Understanding Aquabot Botnet Aquabot is a botnet built on the Mirai framework, a well-known malware strain used to take control of internet-connected devices for disruptive cyber activities. Since its emergence in... Read more

February 3, 2025
PlushDaemon APT Group: A Dive into a Covert Cyber Operation screenshot

PlushDaemon APT Group: A Dive into a Covert Cyber Operation

Unveiling a Sophisticated Cyber Threat PlushDaemon, an advanced persistent threat (APT) group with links to China, represents a sophisticated player in cyber espionage. This group has drawn attention for its targeted... Read more

January 22, 2025
Loading...