Home Search

malware - search results

If you're not happy with the results, please do another search
New FireScam Android Malware Abusing Firebase Services To Evade Detection

New FireScam Android Malware Abusing Firebase Services To Evade Detection

FireScam, an information stealer malware with spyware capabilities, is being disseminated as a fake "Telegram Premium" application. The malware spreads through a phishing website...
EAGERBEE Malware Expands Arsenal With Advanced Payloads And Command Shells

EAGERBEE Malware Expands Arsenal With Advanced Payloads & Command Shells

The EAGERBEE malware, a sophisticated backdoor previously linked to cyberespionage campaigns in the Middle East and Southeast Asia, has undergone significant updates. Recent investigations...
Memory-Based Attacks

Memory-Based Attacks: How Fileless Malware Operates Without Leaving A Trace

Threat actors are always developing new and more effective approaches to system breaches in the perpetually shifting field of cybersecurity. From basic computer viruses...
 Session Smart Routers With Default Passwords Hacked By Mirai Malware

 Session Smart Routers With Default Passwords Hacked By Mirai Malware

Juniper Networks has issued an urgent advisory following reports of Mirai malware infections targeting Session Smart Routers (SSRs) left with default passwords. The campaign,...
Beware Of Malicious SharePoint Notifications Delivering Xloader Malware

Beware Of Malicious SharePoint Notifications Delivering Xloader Malware

A sophisticated phishing campaign exploiting fake Microsoft SharePoint notifications to distribute the Xloader malware. This malicious operation, recently intercepted by Sublime Security, highlights the growing...
Google’s New XRefer Tool to Analyze More Complex Malware Samples

Google’s New XRefer Tool to Analyze More Complex Malware Samples

Google's Mandiant FLARE team has unveiled XRefer, a cutting-edge tool designed to streamline the complex process of malware analysis. This innovative plugin for IDA Pro...
cShell DDOS MALWARE

New DDoS Malware “cShell” Exploit Linux Tools to Attack SSH Servers

The AhnLab Security Intelligence Center (ASEC) has uncovered a new strain of DDoS malware, named cShell, targeting poorly managed Linux SSH servers (screen and...
30,000 Devices in Germany Discovered with Pre-installed Malware “Badbox”

30,000 Devices in Germany Discovered with Pre-installed Malware “Badbox”

The Federal Office for Information Security (BSI) in Germany has taken decisive action against a wave of malware-infected digital picture frames and media players...
New HeartCrypt Packer-as-a-Service (PaaS) Protecting Malware From Antivirus

New HeartCrypt Packer-as-a-Service (PaaS) Protecting Malware From Antivirus

A new packer-as-a-service (PaaS) called HeartCrypt has emerged as a powerful tool for malware operators to evade antivirus detection. Developed in July 2023 and launched...
New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and unique privilege escalation methods...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...