Researchers from cybersecurity firm Abnormal Security observed threat actors spreading the BazarLoader/BazarBackdoor malware via website contact forms rather than typical phishing emails to evade…
Cobalt Strike
Entropy malware planted using Dridex malware on affected computers
Dridex, a general-purpose malware, and Entropy, a less known ransomware strain, share similarities as a result of operators playing with names in their extortion…
A new difficult to detect ransomware has been identified
A small but potent ransomware campaign has been carrying out attacks, and these cyberattacks, for the most part, have gone undetected mainly because of…
Playbook by Ransomware-as-a-Service provider Leaked Source Code
According to researchers, Conti, the group that provides ransomware as a service (RAAS), just exposed their playbook. In addition to the Cobalt Strike handbook…
Conti Playbook leaked: Did you hear about it?
Analysts as of late got a playbook that was leaked connected to Conti, the Ransomware-as-a-Service (RaaS) gang. It has uncovered plenty of data about…
Russian hackers aimed for the Slovak Government
A Russian hackers gang connected to one of Russia’s forces of knowledge has zeroed down on the Slovak government for quite a long time,…
Phishing fraud BazarBackdoor uses New Deception to defy security
Another obfuscation of phishing fraud campaign has been found conveying the BazarBackdoor malware. The mission is utilizing the multi-pressure technique to cover up the…
Nobelium Hackers Phishing Campaign Pretended as USAID; Microsoft
In the latest Microsoft research, it has been reported that following the USAID email account hacking incident, nation-backed Russian threat group Nobelium is now…
Hello ransomware’s combined threat-China Chopper and Microsoft Sharepoint Vulnerability
In recent ransomware developments, security researchers have discovered that the Hello ransomware (or WickrMe ransomware) has been exploiting the Microsoft SharePoint vulnerability to initiate…
IcedID Banking Trojan Deployed Via Legitimate Contact Forms
It has recently the Microsoft 365 Defender Threat Intelligence Team has detected that malicious actors are deploying the IcedID info-stealer malware via authentic corporate…