Evil Corp Switched to Using LockBit Malware to Avoid Sanctions
The Evil Corp group switched to using the LockBit ransomware to avoid sanctions imposed earlier by the Office of Foreign Assets Control of the US Department of the Treasury (OFAC).…
Warning Signs Of DDoS Attack: Symptoms
DDoS attacks can sometimes have devastating effects on various internet users. This particular type of cyber threat can put on hold different internal operations, create negative relationships with customers, and…
Extension spoofing strikes Spanish-speaking countries
An old-good form of malware disguisment sparked recently in several Spanish-speaking countries across the globe. Users note numerous cases of email attachments with spoofed file extensions, that appear to be…
Types of SQL Injection: Attack Examples
As we wrote in one of the articles, SQL is a structured query programming language (SQL, Structured Query Language) that allows programmers to communicate with large databases in almost plain…
Malware VS Ransomware: What’s the Difference?
To deal with any problem successfully you should first have a clear understanding of what you are dealing with. Nowadays the cyber threat landscape has expanded enormously with online cyber…
TOP 7 Types of Password Attacks
What is a Password Attack? In the beginning, you probably already understood from the name what these attacks are and what they are aimed at. It is resistance against someone…
Critical Vulnerability in UNISOC Devices Patched
UNISOC-chip Android Phones are Vulnerable to Remote Modem-Targeting Attacks In May 2022, the UNISOC company was informed by Check Point Research specialists about a critical vulnerability present in UNISOC chipset…
Information Security Specialists Discovered a 0-day Vulnerability in Windows Search
A new 0-day Windows Search vulnerability could be used to automatically open a search box and launch remote malware, which is easily done by simply opening a Word document. Bleeping…
Clipminer – a Million Dollar Clipboard Hijacking Coinminer
Clipminer Malware A bizarrely efficient botnet cryptocurrency miner has been revealed by Symantec security experts. Besides its classic mining function, it has a feature of clipboard hijacking, thence comes the…
CMD-Based Ransomware YourCyanide With Info-Stealing Functions
New Threat: YourCyanide Ransomware CMD-based ransomware YourCyanide, currently under development, has been found and analyzed recently by the Trend Micro group of malware researchers. The malware in question does not…
Chinese Hackers Attack Fresh 0-day Follina Vulnerability
Experts have warned that Chinese hackers are already actively exploiting a 0-day vulnerability in Microsoft Office known as Follina to remotely execute malicious code on vulnerable systems. Let me remind…
What is Spear Phishing? Definition with Examples
Spear phishing is a type of phishing attack that targets specific individuals or organizations typically through malicious emails. For example, cybercriminals can pretend to be a trusted person or organization…