Stealer malware is a type of malicious software designed to infiltrate computers and extract sensitive information. Once installed, it communicates with a command-and-control server operated by threat actors and enables
All posts by admin
Threat Actors Attacking macOS Users With New Multi-stage Malware
Multi-stage malware means sophisticated cyberattack strategies that evolve in several steps. Recent developments in multi-stage malware highlight the increasing sophistication of cyber threats. SentinelOne researchers recently discovered that threat actors
Hackers Can Hijack Your MFA Enabled Email Accounts By Stealing Cookies
MFA enhances the security of email accounts by requiring users to provide additional verification beyond just their password. Implementing MFA reduces the risk of unauthorized access which makes it a
Hackers Use ZIP File Concatenation Tactic to Launch Undetected Attacks on Windows Users
Cybercriminals are utilizing a sophisticated evasion strategy called ZIP file concatenation to specifically target Windows users. This method combines several ZIP files into a single archive, making it harder for
Cisco Industrial Wireless Software Flaw Let Attackers Run Command As Root User
Hackers target Cisco primarily due to its critical role in global network infrastructure and security. Cisco’s devices are essential for protecting sensitive data and communications which makes them attractive targets
New SteelFox Malware Infected 11,000+ Windows Systems Mimics Software Activators
Hackers primarily target Windows systems due to their significant market share: Over 80% of desktop operating systems run Windows. Not only that even nearly 50% of hackers compromised Windows systems
LameDuck’s Skynet Botnet Launched 35,000+ DDoS Attacks
A DDoS attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, and network with a flood of internet traffic from multiple compromised devices. DDoS
HookBot Malware’s Overlay Attacks To Impersonate As Popular Brands
Overlay attacks involve placing a tricky layer over legitimate applications on mobile devices like Android. This malicious overlay can mimic the interface of trusted apps, tricking users into entering sensitive
Azure API Management Flaws Let Attackers Take Full Control APIM Service
Security researchers at Binary Security have uncovered critical vulnerabilities in Microsoft’s Azure API Management (APIM) service that could allow attackers with basic Reader permissions to gain complete administrative control of
APT36 Group Attacking Windows Systems Absuing Google Drive & Slack
ElizaRAT is a type of malware that primarily targets Windows systems and functions as a RAT. It enables threat actors to gain unauthorized access to infected machines. This malware is

