Search Results for: backdoors Blog Post SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been... Blog Post Magecart Hackers Now Hide PHP-Based Backdoor in Website Favicons June 7, 2021 Recently, security researchers have observed criminal activity in the realm of the cyber world by a cybercriminal group named Magecart... Blog Post Newly Found Malware Threatens IoT Devices January 12, 2022 A new malware has been identified by AT&T Alien Labs that exposed millions of Internet of Things devices. The BotenaGo... Blog Post OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack... Blog Post “Corona Antivirus” Software is Distributing Malware Backdoor March 28, 2020 Even though the whole world is now worrying about the outbreak of COVID-19, hackers never stop attacking. In the Internet... Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently... Blog Post FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the... Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It... Blog Post Iranian Hackers Backdoor Entry Through VPN Servers of Giant Organizations February 25, 2020 After the 2010 Stuxnet worm attack on the Natanz Nuclear plant, Iran has started taking ‘Cyber’ seriously. Towards proving their... Blog Post Spread of Ransomware Through SEO Poisoning November 18, 2021 SEO poisoning or search poisoning is a cybercrime strategy that hackers use to lure visitors to malicious sites by using... Blog Post Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve... Blog Post Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects... Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...
Blog Post SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been...
Blog Post Magecart Hackers Now Hide PHP-Based Backdoor in Website Favicons June 7, 2021 Recently, security researchers have observed criminal activity in the realm of the cyber world by a cybercriminal group named Magecart...
Blog Post Newly Found Malware Threatens IoT Devices January 12, 2022 A new malware has been identified by AT&T Alien Labs that exposed millions of Internet of Things devices. The BotenaGo...
Blog Post OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...
Blog Post “Corona Antivirus” Software is Distributing Malware Backdoor March 28, 2020 Even though the whole world is now worrying about the outbreak of COVID-19, hackers never stop attacking. In the Internet...
Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...
Blog Post FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the...
Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...
Blog Post Iranian Hackers Backdoor Entry Through VPN Servers of Giant Organizations February 25, 2020 After the 2010 Stuxnet worm attack on the Natanz Nuclear plant, Iran has started taking ‘Cyber’ seriously. Towards proving their...
Blog Post Spread of Ransomware Through SEO Poisoning November 18, 2021 SEO poisoning or search poisoning is a cybercrime strategy that hackers use to lure visitors to malicious sites by using...
Blog Post Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting...
Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve...
Blog Post Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects...
Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...