The Pay-Per-Install (PPI) malware service, PrivateLoader, has been acquiring popularity in delivering a motley of malware. Usually, malware operators pay such service owners to…
Malware
RedLine malware is used by Fake Windows 11 upgrade installers
Threat actors have started dispersing fake Windows 11 upgrade installers to users of Windows 10, tricking them into downloading and running RedLine stealer malware.…
MyloBot used for sending sextortion emails
MyloBot’s latest version has been used to plant malicious payloads, and the payloads are being used to send sextortion emails. The emails have a…
Alert Overload and Handling – A Guide for Lean IT Security Teams
An alarming study revealed the stress and strains that the average cybersecurity team experiences daily. Nearly 70% of teams report feeling emotionally devastated by…
Android Users were Targeted by Dark Herring
A fraudulent subscription campaign called Dark Herring has targeted over 100 million Android users worldwide. The campaign has been operating for almost two years.…
Attackers can Take Over Computers through PowerPoint Files
Attackers use socially engineered emails with .ppam file attachments that hide malware that can rewrite Windows registry settings on targeted machines. The attacker used…
Indian Government and Military targeted by new CapraRAT Android malware
An advanced persistent threat (APT) group having political ambitions has added a new remote access trojan (RAT) to its malware arsenal. The RAT is…
BRATA, android malware, evolves to become more dangerous
Cybercriminals are using banking trojans extensively. We discuss Android malware that has evolved to be more harmful and sneakier. Cleafy, a security firm, studied…
Hackers using a new method to plant AsyncRAT malware
A malware campaign, since September 2021, has been using an advanced phishing attack to deliver the AsyncRAT trojan. “Through a simple email phishing tactic…
Log4j vulnerability targets SolarWinds, ZyXEL devices
SolarWinds and ZyXEL devices are being attacked by cybercriminals who are searching for Log4jShell vulnerability aka log4j vulnerability. The devices are known to contain…