Once dismissed proof-of-concept attack on Microsoft OS through WSL detected in the wild Linux binaries have been found trying to take over Windows systems in what...
The rapid rise in digitalization and shifting applications to the cloud has given birth to new attack surfaces and opportunities to threat actors. Cybercriminals are working...
Medical tech multinational Olympus has sought to reassure customers that its services are running normally following a cyber-attack that prompted the shutdown of certain IT systems last week....
Dridex is a Trojan malware, also known as Bugat or Cridex, which is capable of stealing sensitive information from infected machines and delivering and executing malicious modules (dll). FortiGuard...
Cybersecurity firm CrowdStrike tracked record levels of cyber intrusion activity over the past year. Adversaries are relying less on malware to conduct attacks that are consequently...
We have malware-as-a-service and ransomware-as-a-service, now get ready for Dropper-as-a-Service (DaaS). Cybercriminals are an ambitious breed and to maximize their profits, they are leveraging DaaS to...
A new malware family has been discovered that uses Common Log File System (CLFS) to stay undetected. Named PRIVATELOG, this malware uses another malware—StashLog—as its installer. What’s...
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a...
An alleged Russian developer for the notorious TrickBot malware gang was arrested in South Korea after attempting to leave the country. The TrickBot cybercrime group is...
An ongoing campaign has been found to leverage a network of websites acting as a “dropper as a service” to deliver a bundle of malware payloads...
Recent Comments