infecting
-
Quick and Simple: BPFDoor Explained
BPFDoor isn’t new to the cyberattack game — in fact, it’s gone undetected for years — but PwC researchers discovered…
Read More » -
Microsoft Warns Rise in XorDdos Malware Targeting Linux Devices
A Linux botnet malware known as XorDdos has witnessed a 254% surge in activity over the last six months, according…
Read More » -
Fake Clickjacking Bug Bounty Reports: The Key Facts
Are you aware of fake clickjacking bug bounty reports? If not, you should be. This article will get you up…
Read More » -
Thousands of WordPress Sites Hacked to Redirect Visitors to Scam Sites
Cybersecurity researchers have disclosed a massive campaign that’s responsible for injecting malicious JavaScript code into compromised WordPress websites that redirects…
Read More » -
[White Paper] Social Engineering: What You Need to Know to Stay Resilient
Security and IT teams are losing sleep as would-be intruders lay siege to the weakest link in any organization’s digital…
Read More » -
Experts Uncover New Espionage Attacks by Chinese ‘Mustang Panda’ Hackers
The China-based threat actor known as Mustang Panda has been observed refining and retooling its tactics and malware to strike…
Read More » -
New EnemyBot DDoS Botnet Borrows Exploit Code from Mirai and Gafgyt
A threat group that pursues crypto mining and distributed denial-of-service (DDoS) attacks has been linked to a new botnet called…
Read More » -
How to Build a Custom Malware Analysis Sandbox
Before hunting malware, every researcher needs to find a system where to analyze it. There are several ways to do…
Read More » -
Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store
A new malware capable of controlling social media accounts is being distributed through Microsoft’s official app store in the form…
Read More » -
Dridex Malware Deploying Entropy Ransomware on Hacked Computers
Similarities have been unearthed between the Dridex general-purpose malware and a little-known ransomware strain called Entropy, suggesting that the operators…
Read More »