Malware

9 Steps to Remove Malware from Your Windows
Application Security
9 Steps to Remove Malware from Your Windows PC
Malware infections pose a significant threat to enterprise businesses. This comprehensive guide outlines a nine-step process to effectively handle malware on Windows systems, minimizing data ...
WolfsBane Linux Malware Unleashed by Chinese Hackers
Cybersecurity
WolfsBane Linux Malware Unleashed by Chinese Hackers
Chinese state-sponsored hackers are using a new Linux backdoor called WolfsBane, a sophisticated malware tool that includes a dropper, launcher, and backdoor, alongside a modified ...
HeptaX Cyberattack: A Deep Dive into the Multi-Stage RDP Exploitation Targeting Enterprises
Application Security
HeptaX Cyberattack: A Deep Dive into the Multi-Stage RDP Exploitation Targeting Enterprises
The HeptaX cyberattack represents a sophisticated, multi-stage threat targeting enterprises, particularly in healthcare. This in-depth analysis details the attack chain, technical analysis, and crucial mitigation ...
Mirai Malware Spreads Via GeoVision Zero-Day Exploit
Malware
Mirai Malware Spreads Via GeoVision Zero-Day Exploit
A Mirai malware botnet is leveraging a zero-day vulnerability (CVE-2024-11120) in outdated GeoVision devices to deploy malware, potentially for DDoS attacks or cryptomining. Thousands of ...
Volt Typhoon Rebuilds Malware Botnet After FBI Disruption
Malware
Volt Typhoon Rebuilds Malware Botnet After FBI Disruption
The Chinese state-sponsored hacking group Volt Typhoon has successfully rebuilt its KV-Botnet malware botnet, targeting outdated Cisco and Netgear routers, despite an FBI disruption earlier ...
Voldemort Malware: A New Threat Abusing Google Sheets for Data Exfiltration
Cybersecurity
Voldemort Malware: A New Threat Abusing Google Sheets for Data Exfiltration
A new malware campaign has emerged, targeting organizations across the globe with a previously undocumented backdoor named "Voldemort."
Crypto Malware: Protecting the Modern Enterprise from Crypto Jacking
Blog
Crypto Malware: Protecting the Modern Enterprise from Crypto Jacking
As cryptocurrency grows in value and popularity, cybercriminals have noticed the opportunity to profit through illicit means such as crypto ...
How Dark Web Monitoring Prevents Data Leaks
Blog
How Dark Web Monitoring Prevents Data Leaks
The dark web has become a shadowy marketplace for stolen data. Login credentials, financial records, trade secrets – anything with ...
RansomHub Ransomware Group Exploits ZeroLogon Vulnerability to Spread Malware
Actively Exploited Bugs
RansomHub Ransomware Group Exploits ZeroLogon Vulnerability to Spread Malware
Security researchers have uncovered ransomware attacks conducted by the notorious RansomHub group leveraging the unpatched ZeroLogon vulnerability (CVE-2020-1472) to gain initial access to victim environments. ...
Banking Malware Grandoreiro is Back After Police Disruption to Target Banks Globally
Cybersecurity
Banking Malware Grandoreiro is Back After Police Disruption to Target Banks Globally
IBM X-Force has observed a renewed Banking malware Grandoreiro campaign that began in March 2024. This follows a law enforcement disruption of the operators in ...