Malware
Tonnerre Malware
The Tonnerre Malware is a malicious second-stage payload that comes with the Foudre Malware. These threats are part of the notorious Infy operation, also known as Prince of Persia. The operation is managed by Iranian... Read more
NHS Is Hit by Another Cyberattack That Left Over 100 Email Accounts Exposed
The coronavirus pandemic has put the healthcare systems of countries all across the world to the test. The lives of millions of people are on the line, and for once, the actions of certain hackers led us to believe... Read more
Top Windows Malware Tips That Will Help You Secure Your System
Our technology is evolving together with us. This constant growth encompasses every single sphere of our lives. Unfortunately, bad things tend to grow as much as the good things. Although we are now much farther in... Read more
A New Malware Campaign Targets HR Departments as the Unemployment Rates Rise
The coronavirus pandemic has affected everyone, and this apparently includes the cybercriminals. For example, in March, Check Point registered a 30% reduction in the number of malware attacks compared to January. It's... Read more
Can You Remove Malware by Restoring Computer to Earlier Date on Windows 10?
System Restore is a very useful feature that enables a user to restore a PC to a previous working state. It utilizes the Shadow Volume Copies technology that Windows automatically and regularly makes in order to track... Read more
SARS-CoV-2 Malware Brings Terror with Data Encryption and Ransom Demands
It's an indisputable fact that the COVID-19 strain has created new opportunities for cyber attackers. Apart from running Coronavirus-related spam email campaigns, hackers have also used the strain to name their... Read more
Foudre Malware
Cyberwarfare is far more prevalent than a regular user thinks. Whatever you hear or see on the news is just a tip of an iceberg, and security researchers have to grapple with multiple threat agents every single day.... Read more
What Is Mass Logger and Why Does It Have Cybersecurity Researchers Worried?
Hacking forums are busy places. Malware authors fight to make fat wads of cash by selling their products to wannabe cybercriminals, and it must be said that there is no shortage of buyers. The competition is stiff,... Read more
Microsoft Users Beware! Coronavirus-Related Malware Lurks in Excel Spreadsheets
After months of quarantine and extended stay-at-home orders, many places prepare to slowly reopen and allow people to try to get back to their routines. Most people are itching to forget about the months they spend... Read more
Here's How Hackers Are Using Steganography in Cyber Attacks
You've all heard the advice that you should never open email attachments unless you know where they're coming from, and we won't be surprised if some of you find it a bit strange. After all, you know that in order to... Read more
SilverTerrier Cybercrime Group Targets Key Workers Fighting Coronavirus
With the Coronavirus pandemic not slowing down, we rely on the people fighting the COVID-19 menace head-on even more. We're all in the hands of medical professionals, and other organizations on the front lines.... Read more
Spyware That Can Record Passwords Is Spread Using Fake Skype and Signal Apps
Attackers can't afford to stop in their quest to find new and interesting ways of infecting victims with malware. For example, when it comes to Android users, there are known infection vectors that, on the face of it,... Read more
Nearly 600 Online Shops Have Been Successfully Attacked by the Same Group of Hackers
After a lengthy investigation, researchers from Gemini Advisory uncovered that a single group of cybercriminals is responsible for the successful attacks against no fewer than 570 ecommerce websites based in 55... Read more
Coronavirus-Related Malware Lurking in Resumes and Medical Leave Files
Cyberattackers turn to every tool in their box of tricks to dupe you into allowing malware into your system. After corrupting a variety of files, maps, links, and whatnot connected to COVID-19, now they've turned to... Read more
Research Revealed That up to 98% of IoT Devices Are Vulnerable and Can Be Exploited in Data Breaches
The rapid exponential growth of IoT (Internet of Things) devices brings in a new era of cybersecurity. Anything that can be connected to the network is a subject to a potential hack, and so, the IoT security is just... Read more
AnarchyGrabber Threatens Discord Users' Security by Stealing Passwords, IDs, Tokens
Some malware strains make the headlines as soon as they appear because they are used in high-profile attacks that cause a lot of damage. The AnarchyGrabber trojan isn't one of them. The malware has been distributed... Read more
Cybercriminals Target Healthcare Organizations Fighting Coronavirus
The world is amid a pandemic. Coronavirus has spread globally and has claimed a staggering amount of victims. People are scared and unsure of what to do and what's to come. In these uncertain times, one thing has... Read more
Hackers Can Target Your Computer and Spread Malware Through Excel Encryption Technique
By now, most Internet users are savvy about the danger of downloading strange files from suspicious emails that end up in their inbox. This has forced hackers to employ more complex forms of social engineering and... Read more