Malwares & Botnets

Quantum ransomware operators carried out the attack in almost 4 hours

The attackers used the IcedID malware as one of their initial access vectors. Quantum ransomware, first discovered in August 2021, has been used in fast network attacks. The...

ZingoStealer malware is distributed among criminals for free

Cisco Talos experts have discovered the ZingoStealer malware, which is distributed for free by the Haskers Gang hacker group. The malware is capable of stealing confidential information...

Fodcha botnet attacks over 100 victims daily

Qihoo 360 (360 Netlab) experts report the discovery of a new Fodcha botnet that launches DDoS attacks on hundreds of victims every day. According to the company,...

Abcbot botnet attacks Chinese cloud providers

The Arcbot botnet attacks the infrastructure of Chinese cloud hosting providers, researchers at Cado Security warned . Presumably, the main purpose of malware is cryptocurrency mining. Abcbot attacks the...

Babuk ransomware sources published on the hacker forum

A group of vx-Underground researchers noticed that the full source code of the Babuk ransomware has been published on the Russian-language hack forum. A member of the...

TrickBot is back with a new user tracking module

Despite attempts to disable the infrastructure of the TrickBot botnet, there are no signs that the malware will go away any time soon. Bitdefender cybersecurity...

The Ransomwhere project creates a database of ransomware payments

Project  Ransomwhere , created by a student at Stanford University and a researcher at the IB-Krebs Stamos Group Jack Cable, creates a free and open database...

Ransomware attacks SonicWall devices more and more

Back in April this year, Mandiant noted that hackers are increasingly using SonicWall devices to infiltrate corporate networks and deploy ransomware. Now the CrowdStrike researchers have come...

Latest news

50% reduction in Google account hacks after enabling 2SV

One of the main problems is the lack of understanding by users of the benefits of additional authorization procedures. It...

The emergence of cheap DarkCrystal RAT worried experts

Researchers from BlackBerry conducted an analysis of the DarkCrystal RAT (aka DCRat) malware and the activity of its developer on the...

What is Advanced Threat Protection, and can you fully rely on it?

ATP or advanced threat protection is a premiere suite of analytical tools and malware protection systems that protect against...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Hackers steal data from network device manufacturer Belden

The American manufacturer of network devices Belden was subjected...

Microsoft Announces Large-Scale Operation BulletProofLink Offering Phishing As A Service

Microsoft experts said BulletProofLink (aka BulletProftLink or Anthrax), a Phishing-as-a-Service (PHaaS),...