Browsing Category
Malware
1440 posts
Linux Variant of Helldown Ransomware Targets VMware ESX Servers
Cybersecurity firm Sekoia has discovered a new variant of Helldown ransomware. The article details their tactics and how…
November 20, 2024
Facebook Malvertising Campaign Spreads Malware via Fake Bitwarden
A Facebook malvertising campaign disguised as Bitwarden updates spreads malware, targeting business accounts. Users are tricked into installing…
November 18, 2024
These 8 Apps on Google Play Store Contain Android/FakeApp Trojan
Article updated on Tuesday, November 19 with statement from Google.
November 14, 2024
Bitdefender Finds New ShrinkLocker Ransomware, Releases Its Decryptor Tool
Bitdefender has released a free decryptor for ShrinkLocker ransomware, which exploits Windows BitLocker to encrypt systems. Discover all…
November 13, 2024
Hackers Use Excel Files to Deliver Remcos RAT Variant on Windows
This article explains the inner workings of the Remcos RAT, a dangerous malware that uses advanced techniques to…
November 9, 2024
New SteelFox Malware Posing as Popular Software to Steal Browser Data
SteelFox malware targets software pirates through fake activation tools, stealing credit card data and deploying crypto miners. Learn…
November 8, 2024
Fabrice Malware on PyPI Has Been Stealing AWS Credentials for 3 Years
The malicious Python package “Fabrice” on PyPI mimics the “Fabric” library to steal AWS credentials, affecting thousands. Learn how…
November 7, 2024
North Korean Hackers Use Fake News to Spread ‘Hidden Risk’ Malware
North Korean hackers are targeting cryptocurrency businesses with a sophisticated new malware campaign, dubbed “Hidden Risk.” Learn how…
November 7, 2024
New Winos4.0 Malware Targeting Windows via Fake Gaming Apps
A sophisticated malware called Winos4.0 is being disguised as harmless gaming applications to infiltrate Windows-based systems. Learn about…
November 6, 2024
Hackers Deploy CRON#TRAP for Persistent Linux System Backdoors
CRON#TRAP is a new phishing attack using emulated Linux environments to bypass security and establish persistent backdoors. Leveraging…
November 5, 2024