Trojan:Win32/Qhosts
Trojan:Win32/Qhosts is malware that provides remote access to the target system and modifies the Hosts file. It is primarily distributed through illegal activation tools found on torrent and warez sites.…
Ubiquiti G4 Vulnerability Discovered, Allowing for DDoS Attacks
Researchers found a flaw in Ubiquiti G4 Wi-Fi cameras, that exposes the selection of important chunks of information. They suppose a similar vulnerability was used back in 2019 to perform…
Eriakos Scam in Facebook Ads Targets Personal and Banking Data
Fraudsters are using fake websites and Facebook Ads to steal users' financial data. Researchers named the campaign Eriakos after the CDN that fraudsters used in all campaigns. Facebook Ads Steal…
BangBros Leak Exposes 12 Million User Records
BangBros, a studio and platform specializing in adult content, leaked information about the users registered on their website. The database was discovered by researchers, and according to their report, it…
PUABundler:Win32/YandexBundled
PUABundler:Win32/YandexBundled is a detection of potentially unwanted application (PUA) associated with the Russian company Yandex. It is typically distributed as bundled software with repackaged or free programs. While being less…
Fake Google Authenticator Abuses Google Ads, Spreads Malware
Cybercriminals promote a fake Google Authenticator page through ads in Google Search. According to the report, they use a tricky scheme to hide the fraudulent domain and make the ad…
Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page
Attackers are using a new loader, Gh0stGambit, to spread Gh0st RAT malware to Chinese users. A Google Chrome phishing download site is being used for that purpose, copying the design…
2024 Olympic Cyberattack Risks: What Should We Expect
The Olympic Games is a massive sporting event that attracts billions of people worldwide. But where there are thousands of people – fans and supporters; there are also cybercriminals. Such…
India Post SMS Phishing Targets Mobile Users in India
Massive complaints come from Indian users regarding a new wave of SMS phishing scams, particularly targeting iPhones. They mimic delivery notification messages from India Post, one of the major postal…
Docker Engine Authentication Bypass Vulnerability Exploited
Attackers are actively exploiting a critical vulnerability in the Docker Engine that may allow for authentication bypass in a chain attack. This vulnerability allows attackers to bypass AuthZ authorization plugins,…
Hamster Kombat Players Targeted in a New Malware Spreading Scheme
Players of Hamster Kombat have become prime targets for scammers promoting phishing schemes aimed at those looking for easy earnings. Malicious actors steal confidential data and infect inattentive players with…
New Telegram Scam Mimics Digital Wallets, Promotes Shady Apps
A new Telegram scam has emerged, leveraging bots functionality of the application and offering fake earning schemes. Scammers impersonate official bots of popular digital wallet brands, tricking users into investing…