Threats

Review Current Cyber Threats & Learn How To Protect Computers, Servers & Cloud Workloads. Threat intelligence and news reporting on the latest cyber adversaries an their tools. Prevent Cyber Attacks. The latest malware and APT information.

FBI Indictment Puts Chinese Government Linked Hackers APT41 in The Spotlight.

0
Seven men have been charged in the U.S. in relation to attacks by China-linked espionage operation which Symantec monitors as two distinct groups – Blackfly and Grayfly By: The Threat...

APT Gamaredon Using New Hacking Tools For Microsoft Outlook, Excel & Office

0
Gamaredon Hackers Using New Tools for Microsoft Outlook, Office, and Excel A Russia-linked APT group named Gamaredon (aka Primitive Bear) has been using several undocumented post-compromise tools in various malicious...

New Info Stealer Poulight From The Russian Underground

0
Poulight Stealer, a new Comprehensive Data Stealer from Russia Introduction Nowadays, info-stealers are one of the most common threats. This category of malware includes famous malware like Azorult, Agent Tesla, and Hawkeye. The infostealer...

Rare UEFI Malware Found in the wild Kaspersky says

0
By Mark Lechtik, Igor Kuznetsov, Yury Parshin  Part II. Technical details (PDF) UEFI (or Unified Extensible Firmware Interface) has become a prominent technology that is embedded within designated chips on modern day computer systems....

Emotet’s SkyRocketing Activities Big Threat for U.S. Agencies, CISA Warns

0
Emotet, the notorious banking trojan that was first seen in 2014 and became one of the most prominent global cyber threats in the past few months, is showing no indications...

Detecting Microsoft 365 and Azure Active Directory Backdoors

0
Mandiant has seen an uptick in incidents involving Microsoft 365 (M365) and Azure Active Directory (Azure AD). Most of these incidents are the result of a phishing email coercing...

How to Protect Your Crypto from Cyber Attacks During Covid

0
The 1997 indie horror movie Cube posited a dystopic future where unwilling prisoners are systematically dismembered by a high-tech prison. The SARS-CoV-2 pandemic has created an environment for a similar virtualized...

Inter skimming kit used in homoglyph attacks

0
Threat actors load credit card skimmers using a known phishing technique called homoglyph attacks. As we continue to track web threats and credit card skimming in particular, we often...

Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication

0
FireEye Email Security recently encountered various phishing campaigns, mostly in the Americas and Europe, using source code obfuscation with compromised or bad domains. These domains were masquerading as authentic...

New Malware Poisons NetBean Java Projects Github Warns

0
GitHub has issued a security alert on Thursday warning about a new malware strain that's been spreading on its site via boobytrapped Java projects. The malware, which GitHub's security team...
Error decoding the Instagram API json