Malware

Microsoft Teams Exploited in Sophisticated Ransomware Attacks
Malware
Microsoft Teams Exploited in Sophisticated Ransomware Attacks
Cybercriminals are exploiting Microsoft Teams for ransomware attacks, using spam emails, Teams messages, and calls to infiltrate companies, steal data, and deploy malware. Sophos identified ...
New Mirai Botnet Leverages Zero-Day Exploits to Target Industrial Routers
Malware
New Mirai Botnet Leverages Zero-Day Exploits to Target Industrial Routers
A new Mirai botnet is using zero-day exploits to target industrial routers and smart home devices, launching high-intensity DDoS attacks. Learn about the vulnerabilities and ...
PLAYFULGHOST Malware: Exploiting Phishing, SEO Poisoning, and Trojanized VPNs
Malware
PLAYFULGHOST Malware: Exploiting Phishing, SEO Poisoning, and Trojanized VPNs
PLAYFULGHOST malware uses phishing, SEO poisoning, and trojanized VPN apps to steal data, highlighting the need for robust cybersecurity practices.
Bitter Cyberespionage Group Leverages New MiyaRAT Malware to Target Turkish Defense Organizations
Malware
Bitter Cyberespionage Group Leverages New MiyaRAT Malware to Target Turkish Defense Organizations
The Bitter cyberespionage group is targeting Turkish defense organizations with the new MiyaRAT malware, a sophisticated RAT with enhanced encryption and capabilities.
FBI Warns of HiatusRAT Malware Attacks Targeting Web Cameras and DVRs
Malware
FBI Warns of HiatusRAT Malware Attacks Targeting Web Cameras and DVRs
The FBI warns of widespread HiatusRAT malware attacks targeting vulnerable web cameras and DVRs, primarily Chinese-branded devices, exploiting known vulnerabilities and weak passwords. Urgent action ...
New IOCONTROL Malware Threatens Critical Infrastructure in Israel and the US
Malware
New IOCONTROL Malware Threatens Critical Infrastructure in Israel and the US
Iranian-linked hackers are using the newly discovered IOCONTROL malware to target critical infrastructure in Israel and the US, compromising IoT devices and SCADA systems. The ...
9 Steps to Remove Malware from Your Windows
Blog
9 Steps to Remove Malware from Your Windows PC
Malware infections pose a significant threat to enterprise businesses. This comprehensive guide outlines a nine-step process to effectively handle malware on Windows systems, minimizing data ...
WolfsBane Linux Malware Unleashed by Chinese Hackers
Cybersecurity
WolfsBane Linux Malware Unleashed by Chinese Hackers
Chinese state-sponsored hackers are using a new Linux backdoor called WolfsBane, a sophisticated malware tool that includes a dropper, launcher, and backdoor, alongside a modified ...
HeptaX Cyberattack: A Deep Dive into the Multi-Stage RDP Exploitation Targeting Enterprises
Blog
HeptaX Cyberattack: A Deep Dive into the Multi-Stage RDP Exploitation Targeting Enterprises
The HeptaX cyberattack represents a sophisticated, multi-stage threat targeting enterprises, particularly in healthcare. This in-depth analysis details the attack chain, technical analysis, and crucial mitigation ...
Mirai Malware Spreads Via GeoVision Zero-Day Exploit
Malware
Mirai Malware Spreads Via GeoVision Zero-Day Exploit
A Mirai malware botnet is leveraging a zero-day vulnerability (CVE-2024-11120) in outdated GeoVision devices to deploy malware, potentially for DDoS attacks or cryptomining. Thousands of ...