MyloBot’s latest version has been used to plant malicious payloads, and the payloads are being used to send sextortion emails. The emails have a…
General
U.S, U.K and Australia warn of soaring ransomware attacks
A joint warning has been issued by cybersecurity authorities of Australia, the U.K., and the U.S. The warning concerns rise in advanced, catastrophic ransomware…
Google auto-enrols users leading to a fall in account hijacking
Since Google announced its campaign to auto-enrol users for 2-step verification last year, Google has auto-enrolled more than 150 million users in 2 step-verification.…
Indian Government and Military targeted by new CapraRAT Android malware
An advanced persistent threat (APT) group having political ambitions has added a new remote access trojan (RAT) to its malware arsenal. The RAT is…
Stealthy backdoor used for targeting Taiwanese financial institutions
Taiwanese financial instiutions have been on the radar of a Chinese advanced persistent threat (APT) group. The group has been running a “persistent campaign”…
Hackers target European Oil ports
Belgian prosecutors are investigating the hacking of oil facilities in the country’s ports, including Antwerp—Europe’s second-biggest port after Rotterdam. In Germany, prosecutors said they…
Threat actor exploiting a zero-day vulnerability in the Zimbra open-source email platform
A threat actor, likely to be Chinese, targeted a zero-day vulnerability in the Zimbra open-source email platform. The zero-day exploitation is part of a…
UpdateAgent Malware, updated variant infects Mac users through Adware
Microsoft revealed details of a Mac Trojan that was previously undocumented. Microsoft said the trojan underwent several changes ever since it first appeared in…
SolarMaker malware evolved to sustain in hacked systems
Threat actors regularly work on their attack strategy and defence measures to beat the protective measures. Solarmaker information stealer and backdoor operators have been…
Emsisoft’s Deadbolt decryption tool is available
Deadbolt ransomware has got a decryption key after a few days it first appeared. However, the threat actors must provide a decryption key for…