Threats

Review Current Cyber Threats & Learn How To Protect Computers, Servers & Cloud Workloads. Threat intelligence and news reporting on the latest cyber adversaries an their tools. Prevent Cyber Attacks. The latest malware and APT information.

Major DDoS Cyberattack Dismissed As T-Mobile Misconfiguration

0
Security experts say there is no evidence the U.S. was hit by a major DDoS cyberattack this week—despite rampant social media speculation. Yesterday, rumors circulated on Twitter after telecom operators, games, social networks, banks and...

APT Gamaredon Using New Hacking Tools For Microsoft Outlook, Excel & Office

0
Gamaredon Hackers Using New Tools for Microsoft Outlook, Office, and Excel A Russia-linked APT group named Gamaredon (aka Primitive Bear) has been using several undocumented post-compromise tools in various malicious...

New Malware Poisons NetBean Java Projects Github Warns

0
GitHub has issued a security alert on Thursday warning about a new malware strain that's been spreading on its site via boobytrapped Java projects. The malware, which GitHub's security team...

Covid-19 Researchers Targeted By Chinese Hackers

0
The CISA & FBI Issue a Join Warning to COVID Researchers The FBI and the U.S. Cybersecurity and Infrastructure Security Agency issued a warning Wednesday that hacking groups linked to China's government...

New Info Stealer Poulight From The Russian Underground

0
Poulight Stealer, a new Comprehensive Data Stealer from Russia Introduction Nowadays, info-stealers are one of the most common threats. This category of malware includes famous malware like Azorult, Agent Tesla, and Hawkeye. The infostealer...

New Ramsay Malware That Can Breach Air Gapped Networks

0
Researchers from cyber-security firm ESET announced today that they discovered a never-before-seen malware framework with advanced capabilities that are rarely seen today. Named Ramsay, ESET says this malware toolkit appears...

Chinese authorities monitor content of WeChat users registered outside China

0
Users cannot determine whether their content has been monitored and, if so, why. WeChat chat accounts registered outside of China are subject to the same level of control as Chinese...

Crypto Stealing Chrome Extensions Discovered

0
A security researcher discovered another 22 Google Chrome web browser extensions that tried to steal users’ cryptocurrencies. A security researcher has discovered another 22 Google Chrome web browser extensions built...

How to Protect Your Crypto from Cyber Attacks During Covid

0
The 1997 indie horror movie Cube posited a dystopic future where unwilling prisoners are systematically dismembered by a high-tech prison. The SARS-CoV-2 pandemic has created an environment for a similar virtualized...

Monero-Mining Campaign Blue Mockingbird Exploits Web Apps

0
The cybercriminals are utilizing a deserialization weakness, CVE-2019-18935, to accomplish remote code execution before moving horizontally through the enterprise. A Monero digital currency mining effort has developed that abuses a...
Error decoding the Instagram API json