AMOS Infostealer Malware Campaign Exploiting Google Ads for macOS Users Recently, a new AMOS infostealer campaign has been discovered, targeting macOS users through a deceptive scheme...
The Glassworm Campaign: A Deep Dive into the Malware Targeting VS Code Developers Recently, the Glassworm campaign has resurfaced with 24 new packages infiltrating the OpenVSX...
The payload, when executed, drops and executes a Cobalt Strike beacon that communicates with a C2 server located at “185[.]250[.]52[.]130”. The technique leverages a vulnerability in...
New ShadowV2 Botnet Malware Targets IoT Devices A new strain of Mirai-based botnet malware, dubbed ‘ShadowV2,’ has recently been detected exploiting vulnerabilities in IoT devices from...
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS...
Malicious Blender Files Delivering StealC Infostealing Malware A recent cybersecurity discovery has revealed that a Russian-linked campaign is distributing the StealC V2 information stealer malware through...
A cyber espionage campaign linked to China, known as APT24, has been utilizing a newly discovered malware named BadAudio over the course of a three-year operation....
A recent discovery in the realm of Android threats is the emergence of a sophisticated banking trojan known as Sturnus. This malware has the capability to...
A resurgence of the decades-old “finger” command has been observed, with threat actors leveraging the protocol to fetch remote commands for execution on Windows devices. Originally...
The Return of DanaBot Malware: New Variant Emerges After 6-Month Hiatus After a significant disruption in May due to law enforcement’s Operation Endgame, the notorious DanaBot...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.