North Korean Group Lazarus Attacks Energy Companies
A new malware campaign by the North Korean hacker group Lazarus has been discovered, which was active from February to July 2022. This time the hackers have targeted energy suppliers…
MooBot Botnet Attacks D-Link Routers
Experts have discovered that the MooBot botnet, built on the Mirai IoT malware, attacks vulnerable D-Link routers using a combination of old and new exploits against them. Let me remind…
Does a Factory Reset Get Rid of Viruses?
You can use the reset feature to destroy the virus from your PC. Besides being an excellent way to eliminate viruses, this is also a way to remove all the…
Facebook Messenger Virus: How to Stay From Facebook Viruses
Facebook Messenger is arguably one of the most popular chatting apps. Unfortunately, because of its popularity, it is a target for malicious programs such as Trojans, spyware, ransomware, and others…
The New Shikitega Malware Is Very Difficult to Detect and Eliminate
AT&T researchers have discovered a new Linux stealth malware called Shikitega that targets computers and IoT devices and uses privilege escalation vulnerabilities to run the Monero cryptocurrency miner on the…
SharkBot Malware Infiltrates Google Play Store Again
Information security specialists from Fox IT discovered two applications in the Google Play Store that distribute the SharkBot Trojan: Mister Phone Cleaner and Kylhavy Mobile Security were installed more than…
Dangers Of Spam Email: Tips How To Avoid, Spam Email Revenge
Many businesses don't consider all of the dangers of spam and just think it is an annoyance. Although unwanted emails are frustrating, they can be threatening in many scenarios. Spam…
Developer of CodeRAT Trojan Releases Source Code
The source code for the CodeRAT remote access trojan has been published on GitHub. This happened after the security researchers identified the malware developer and called him to account because…
Cisco Hack Is Linked to Russian-Speaking Hackers from Evil Corp
Experts from eSentire established that the infrastructure used to hack Cisco in May 2022 was exploited to compromise an unnamed HR solutions company a month earlier. Researchers believe that malicious…
The Japanese Government Decided to Fight the Use of … Floppy Disks
As it turns out, more than 1,900 administrative procedures in Japan still require the use of floppy disks. Now, the newly appointed head of Japan's Ministry of Digital Reform, Taro…
All About Hacker Motivation: Why Do Hackers Hack?
Usually, hackers hack for monetary gain. However, there are less apparent reasons lurking beneath the surface. But knowledge of technology is not enough to be a successful hacker. You also…
Malware Hides in Images from the James Webb Telescope
Securonix researchers have noticed an interesting malware campaign that distributes a malware called GO#WEBBFUSCATOR written in Go. Hackers use phishing emails, malicious documents, and images from the James Webb telescope…