Fronton IOT Botnet Packs Disinformation Punch
Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda.
A fresh look at the Fronton DDoS-focused botnet reveals the criminal...
DOJ Says Doctor is Malware Mastermind
The U.S. Department of Justice indicts middle-aged doctor, accusing him of being a malware mastermind.
On Monday, the U.S. Attorney’s Office for the Eastern District of New York revealed...
April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell
Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.
Recently reported VMware bugs are being used by hackers...
Malware Builder Leverages Discord Webhooks
Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks.
On April 23rd, 2022, a Discord user with the handle “Portu” began advertising a...
Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service
An account promoting the project—which offers a range of threat activity from info-stealing to crypto-mining to ransomware as individual modules—has more than 500 subscribers.
Cybercriminals are promoting a new, modular...
Ransomware Deals Deathblow to 157-year-old College
Why a private college that stayed in business for 157 years had to close after the combo of COVID-19 and ransomware proved too much.
Illinois-based Lincoln College was established during...
Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks
The stealthy, feature-rich malware has multistage evasion tactics to fly under the radar of security analysis, researchers at Proofpoint have found.
A newly discovered and complex remote access trojan (RAT)...
Conti Ransomware Attack Spurs State of Emergency in Costa Rica
The threat group has leaked data that it claims was stolen in the breach and is promising more government-targeted attacks.
Costa Rican President Rodrigo Chaves declared a state of national...
Low-rent RAT Worries Researchers
Researchers say a hacker is selling access to quality malware for chump change.
For about the price of a cup of Starbucks latte, a hacker is renting out a remote...
Attackers Use Event Logs to Hide Fileless Malware
A sophisticated campaign utilizes a novel anti-detection method.
Researchers have discovered a malicious campaign utilizing a never-before-seen technique for quietly planting fileless malware on target machines.
The technique involves injecting shellcode...