Malware

Hackers Exploit eScan Antivirus Updates to Drop GuptiMiner Malware
Cybersecurity
Hackers Exploit eScan Antivirus Updates to Drop GuptiMiner Malware
North Korean hackers have recently been utilizing the updating mechanism of eScan antivirus software to infiltrate large corporate networks. They ...
Hackers Use Fake Facebook Midjourney AI Pages to Infect Over 1 Million with Malware
Malware
Hackers Use Fake Facebook Midjourney AI Pages to Infect Over 1 Million with Malware
Hackers have infected Over 1 Million with Malware Using Fake Facebook Midjourney AI Pages. Cybercriminals are creating fake profiles impersonating ...
DinodasRAT Malware Targets Red Hat and Ubuntu Linux Servers for Cyber Espionage
Cybersecurity
DinodasRAT Malware Targets Red Hat and Ubuntu Linux Servers for Cyber Espionage
Security researchers have recently detected attacks targeting Red Hat and Ubuntu systems by a Linux version of the DinodasRAT malware, ...
Google's New AI Search, Or a Gateway to Malware and Scams?
Blog
Google’s New AI Search, Or a Gateway to Malware and Scams?
Search engines play a crucial role in guiding users to relevant and trustworthy information. Google, being the most popular search ...
APT29 Russian Hackers Use WineLoader Malware to Target German Political Parties
Malware
APT29 Russian Hackers Use WineLoader Malware to Target German Political Parties
The APT29 group is employing phishing attacks to distribute a backdoor called WineLoader malware. This malicious software enables the hackers ...
Fujitsu Hacked with Malware, Company Warns of Data Breach
Data Breach
Fujitsu Hacked with Malware, Company Warns of Data Breach
Fujitsu Limited has reported the detection of malware on some of its operational computers, leading to possible personal and customer ...
Magnet Goblin Hackers Exploit 1-day Vulnerabilities to Deploy NerbianRAT Linux Malware
Actively Exploited Bugs
Magnet Goblin Hackers Exploit 1-day Vulnerabilities to Deploy NerbianRAT Linux Malware
The Magnet Goblin hackers, driven by financial motives, use 1-day vulnerabilities to breach servers and install custom Linux malware NerbianRAT ...
‘UNC1945’ Uses GTPDOOR Linux Malware to Target Mobile Operators
Malware
‘UNC1945’ Uses GTPDOOR Linux Malware to Target Mobile Operators
Security researcher HaxRob has recently identified a Linux backdoor called GTPDOOR that has not been previously documented. This backdoor appears ...
Bifrost Malware Mimics VMware Domain on Linux for Evasion
Cybersecurity
Bifrost Malware Mimics VMware Domain on Linux for Evasion
A recently discovered Linux variant of the Bifrost malware RAT (remote access Trojan) has implemented several innovative methods to evade ...
Cencora Data Breached, Personal Information of Patients Stolen
Data Breach
Cencora Data Breached, Personal Information of Patients Stolen 
The Cencora Data Breach resulted in theft of sensitive data after malicious actors gained unauthorized access to their corporate IT ...