Attackers Began to Embed Keyloggers in Phishing Pages
Analysts from the Cyble company recorded an interesting phishing campaign against users from Greece: attackers began to embed keyloggers into phishing pages. The operators of this scam operate phishing sites…
Lorenz Ransomware Penetrates Company Networks through Mitel VoIP Products
Security firm Arctic Wolf has warned that Lorenz ransomware is exploiting a critical vulnerability in Mitel MiVoice VoIP devices to infiltrate corporate networks. Let me remind you that we also…
Ransomware publishes data stolen from Cisco
The Yanluowang hack group published data stolen from Cisco back in May 2022. Cisco representatives acknowledged that the data leak took place, but still insist that the incident did not…
0-day Vulnerability in WordPress BackupBuddy Plugin Attacked Over 5 million Times
Wordfence analysts have discovered that a fresh 0-day vulnerability in the popular WordPress plugin, BackupBuddy, which has been installed about 140,000 times, is under active attack. Since August 26, 2022,…
North Korean Group Lazarus Attacks Energy Companies
A new malware campaign by the North Korean hacker group Lazarus has been discovered, which was active from February to July 2022. This time the hackers have targeted energy suppliers…
MooBot Botnet Attacks D-Link Routers
Experts have discovered that the MooBot botnet, built on the Mirai IoT malware, attacks vulnerable D-Link routers using a combination of old and new exploits against them. Let me remind…
Does a Factory Reset Get Rid of Viruses?
You can use the reset feature to destroy the virus from your PC. Besides being an excellent way to eliminate viruses, this is also a way to remove all the…
Facebook Messenger Virus: How to Stay From Facebook Viruses
Facebook Messenger is arguably one of the most popular chatting apps. Unfortunately, because of its popularity, it is a target for malicious programs such as Trojans, spyware, ransomware, and others…
The New Shikitega Malware Is Very Difficult to Detect and Eliminate
AT&T researchers have discovered a new Linux stealth malware called Shikitega that targets computers and IoT devices and uses privilege escalation vulnerabilities to run the Monero cryptocurrency miner on the…
SharkBot Malware Infiltrates Google Play Store Again
Information security specialists from Fox IT discovered two applications in the Google Play Store that distribute the SharkBot Trojan: Mister Phone Cleaner and Kylhavy Mobile Security were installed more than…
Dangers Of Spam Email: Tips How To Avoid, Spam Email Revenge
Many businesses don't consider all of the dangers of spam and just think it is an annoyance. Although unwanted emails are frustrating, they can be threatening in many scenarios. Spam…
Developer of CodeRAT Trojan Releases Source Code
The source code for the CodeRAT remote access trojan has been published on GitHub. This happened after the security researchers identified the malware developer and called him to account because…