Zloader malware is abusing Microsoft e-signature to steal sensitive data
A new campaign is identified by security researchers manipulating the Microsoft e-signature and deploying Zloader malware that steals banking credentials.
A new campaign is identified by security researchers manipulating the Microsoft e-signature and deploying Zloader malware that steals banking credentials.
A threat actor that goes by the name ‘Elephant Beetle’ is using a combination of around 80 tools to steal millions of dollars from enterprises across the world.
Purple Fox malware is distributed via malicious Telegram Desktop Installer, this malware installs further payloads on the affected devices.
If you’re wondering whether your email account is compromised by RedLine malware, you can check the same with ‘Have I Been Pwned’ website as RedLine malware has now 441,000 accounts that are compromised.
AvosLocker Ransomware group has given a free decryptor after accidentally encrypting a US government agency.
A new malicious campaign was discovered by security researchers that disguises malicious code as legitimate exe files. The researchers have figured out that there is a payload that is considered a novel threat and being distributed to Windows systems with a low detection rate called Blister.
A phishing campaign is ongoing and deploying a new malware called Dridex. This campaign sends fake employee termination emails so the victims will fall for the bait and open the email with a malicious excel file which when opened mocks the victims with season greetings.
Cybersecurity is a process of managing and securing networks, servers, computers, users, mobile devices, applications, and databases from cyberattacks, data leakage and unauthorized access. It is normally a combination of strategy, process, tools, skills and implementation to achieve improved cyber resilience against unforeseen data breaches and cyber attacks.
CISA has requested VMware users to patch a critical vulnerability in the Workspace ONE UEM that cyber criminals could exploit to access sensitive data.
Cyber criminals are exploiting the Apache Log4j vulnerability and have switched their maneuvers from LDAP callback URLs to RMI or sometimes they are combined together for better success rates.
Our vision is to deliver the trending and happening cyber events to the enthusiasts.
We believe in delivering educational and quality content for hassle-free understanding of the subject.
You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.