Malwares & Botnets

New malware downloads Cobalt Strike via PNG image from Imgur

A security researcher using the Arkbird alias talked about a new malware that uses Word files with macros to download PowerShell scripts from GitHub. The script additionally...

Cyberpunk 2077 Android Ransomware ! Encrypt ALL Android Files!

ThreatIT Reports for the second time after ThreatIT first article about CyberPunk2077 and after Kaspersky Lab specialists discovered malware that was disguised as a beta version...

List of MageCart malware hacked stores has been revealed

Sansec experts noticed that the dropper of an unnamed hack group infecting online stores with MageCart malware (web skimmers) contains a list of compromised...

Gitpaste-12 is back with a vengance

The Gitpaste-12 worm that spreads via GitHub and also hosts malicious payload on Pastebin, has returned with even more exploits. While the first iteration...

Malware in Ruby Gems repository For Second Time

Sonatype experts have discovered the pretty_color and ruby-bitcoin malicious packages in the official RubyGems repository. The malware has already been removed from the platform. The malware hidden in...

Pay2Key ransomware Attacked Again! Intel-owned Habana Labs Were attacked !

Edition Bleeping Computer reports that the Israeli company Habana Labs, which develops solutions in the field of AI, since 2019 owned by the Intel, was attacked...

PgMiner botnet attacks poorly protected PostgreSQL databases

Palo Alto Networks specialists discovered the PgMiner botnet, which specializes in hacking poorly protected PostgreSQL databases in order to install miners. The botnet operates according to a...

NjRAT use Pastebin as a management server

Analysts at Palo Alto Networks report that since at least October of this year, operators of the njRAT trojan have been using Pastebin as a control...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds...

Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken

The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Apple in trouble? Researchers find over 50 vulnerabilities

It's not as often that we hear about Apple's...

Windows XP Source Code: It works!

A couple of days ago we reported that -...