New ShadowV2 Botnet Malware Targets IoT Devices A new strain of Mirai-based botnet malware, dubbed ‘ShadowV2,’ has recently been detected exploiting vulnerabilities in IoT devices from...
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS...
Malicious Blender Files Delivering StealC Infostealing Malware A recent cybersecurity discovery has revealed that a Russian-linked campaign is distributing the StealC V2 information stealer malware through...
A cyber espionage campaign linked to China, known as APT24, has been utilizing a newly discovered malware named BadAudio over the course of a three-year operation....
A recent discovery in the realm of Android threats is the emergence of a sophisticated banking trojan known as Sturnus. This malware has the capability to...
A resurgence of the decades-old “finger” command has been observed, with threat actors leveraging the protocol to fetch remote commands for execution on Windows devices. Originally...
The Return of DanaBot Malware: New Variant Emerges After 6-Month Hiatus After a significant disruption in May due to law enforcement’s Operation Endgame, the notorious DanaBot...
The Return of GootLoader: A New Wave of Cyber Attacks Unveiled Recent findings from cybersecurity firm Huntress have revealed a resurgence in GootLoader activity, with three...
Last week, cyber threats continued to evolve, with attackers deploying increasingly sophisticated tactics. Malware hidden in virtual machines, side-channel leaks compromising AI conversations, and spyware targeting...
Gootloader Malware Operation Resumes with SEO Poisoning Tactics After a 7-month hiatus, the notorious Gootloader malware loader operation has resurfaced, utilizing SEO poisoning to drive traffic...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.