Malware & Threats
eScan Antivirus Update Procedure Exploited for Dissemination of Backdoors and Cryptocurrency Miners
A novel malware initiative has emerged, exploiting the update mechanism of the eScan antivirus software to disseminate backdoors and cryptocurrency miners, including XMRig, through...
admin -
Malware & Threats
Researchers Outline Multifaceted Attack Hijacking Systems with SSLoad, Cobalt Strike
In the realm of cybersecurity, a persistent campaign has been unearthed, employing deceptive emails to dispense a malicious entity dubbed SSLoad.
This operation, dubbed FROZEN#SHADOW...
admin -
Malware & Threats
United States Enacts Visa Limitations on 13 Connected to Improper Use of Business Espionage Software
The U.S. Administration of State announced on Monday its intent to enact visa constraints on 13 individuals purportedly associated with the creation and distribution...
admin -
Malware & Threats
Unmasking the Genuine Toll of Cyberattacks: Beyond Ransom and Recovery
The realm of cybersecurity breaches carries profound repercussions for individuals and enterprises alike. Amidst the quest to comprehend the rationale behind such breaches, a...
admin -
Malware & Threats
Russian Hacker Group ToddyCat Employing Sophisticated Instruments for Large-Scale Data Theft
The collective identified as ToddyCat has been observed employing an extensive array of instruments to maintain access to infiltrated environments and pilfer valuable data.
Russian...
admin -
Malware & Threats
Investigating Windows Imperfections Bestowing Intruders Rootkit-Equivalent Authorities
Recent investigations reveal that the conversion procedure from DOS to NT paths in Windows could be manipulated by malicious entities to attain capabilities akin...
admin -