Articles
Quantum ransomware operators carried out the attack in almost 4 hours
The attackers used the IcedID malware as one of their initial access vectors.
Quantum ransomware, first discovered in August 2021, has been used in fast network attacks. The...
Articles
ZingoStealer malware is distributed among criminals for free
Cisco Talos experts have discovered the ZingoStealer malware, which is distributed for free by the Haskers Gang hacker group.
The malware is capable of stealing confidential information...
Articles
Fodcha botnet attacks over 100 victims daily
Qihoo 360 (360 Netlab) experts report the discovery of a new Fodcha botnet that launches DDoS attacks on hundreds of victims every day. According to the company,...
Articles
Abcbot botnet attacks Chinese cloud providers
The Arcbot botnet attacks the infrastructure of Chinese cloud hosting providers, researchers at Cado Security warned . Presumably, the main purpose of malware is cryptocurrency mining.
Abcbot attacks the...
Articles
Babuk ransomware sources published on the hacker forum
A group of vx-Underground researchers noticed that the full source code of the Babuk ransomware has been published on the Russian-language hack forum. A member of the...
Articles
TrickBot is back with a new user tracking module
Despite attempts to disable the infrastructure of the TrickBot botnet, there are no signs that the malware will go away any time soon.
Bitdefender cybersecurity...
Articles
The Ransomwhere project creates a database of ransomware payments
Project Ransomwhere , created by a student at Stanford University and a researcher at the IB-Krebs Stamos Group Jack Cable, creates a free and open database...
Articles
Ransomware attacks SonicWall devices more and more
Back in April this year, Mandiant noted that hackers are increasingly using SonicWall devices to infiltrate corporate networks and deploy ransomware. Now the CrowdStrike researchers have come...
Latest news
50% reduction in Google account hacks after enabling 2SV
One of the main problems is the lack of understanding by users of the benefits of additional authorization procedures.
It...
The emergence of cheap DarkCrystal RAT worried experts
Researchers from BlackBerry conducted an analysis of the DarkCrystal RAT (aka DCRat) malware and the activity of its developer on the...
What is Advanced Threat Protection, and can you fully rely on it?
ATP or advanced threat protection is a premiere suite of analytical tools and malware protection systems that protect against...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Hackers steal data from network device manufacturer Belden
The American manufacturer of network devices Belden was subjected...
Microsoft Announces Large-Scale Operation BulletProofLink Offering Phishing As A Service
Microsoft experts said BulletProofLink (aka BulletProftLink or Anthrax), a Phishing-as-a-Service (PHaaS),...
Vietnamese APT group goes into mining along with cyber espionage operations
APT groups are not limited to Iran, Russia, China...