SYMBIOTE Backdoor and Rootkit Dropper Revealed

Symbiote Backdoor: a Stealthy and Highly Evasive Linux Malware Researchers at Blackberry and Intezer have revealed a malignant program dubbed Symbiote used to inject rootkits and backdoors into compromised Linux servers. This software has been targeting financial institutions throughout South America. To install the pest into the system, the malefactors need root access, which they… Continue reading SYMBIOTE Backdoor and Rootkit Dropper Revealed

Warning Signs Of DDoS Attack: Symptoms

Warning Signs Of DDoS Attack: Symptoms

DDoS attacks can sometimes have devastating effects on various internet users. This particular type of cyber threat can put on hold different internal operations, create negative relationships with customers, and generally make websites inaccessible. DDoS Attacks Target Businesses And Ordinary Users Not only various businesses suffer from DDoS attacks but also ordinary users can sometimes… Continue reading Warning Signs Of DDoS Attack: Symptoms

Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

Photo: INTERPOL

North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims. Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified… Continue reading Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

LockBit attacks the Canadian defensive co. Top Aces inc

LockBit, Top Aces Inc., Ransomware, Ransomware attack, cyberattack,

Canadian defense contractor Top Aces Inc became the victim of a ransomware attack. LockBit group, an infamous ransomware gang known for its strict principles, already claimed responsibility. They boasted of it by posting the logotype of this company on their Darknet site. More details about the Top Aces company Top Aces Inc is a defense… Continue reading LockBit attacks the Canadian defensive co. Top Aces inc

The 5 Most Famous Spyware Attacks

Spyware can be called the most sophisticated malware these days. It never acts openly, uses tricky techniques, and appears more often with other viruses. Together with its brother-in-law – stealer malware – spyware helps the cyber criminals to find and exfiltrate the data from attacked corporations. Moreover, ransomware that aims at individuals (exactly, STOP/Djvu family)… Continue reading The 5 Most Famous Spyware Attacks

What is a Smurf Attack? How Does It Work?

DDoS, Smurf attack, DDoS attack

Smurfing, or smurf attack, is a kind of DDoS attack. It has a pretty easy mechanism, but counteracting it may be as hard as it could be with the most sophisticated types of denial attacks. Let’s check how that works, and figure out how to mirror that attack as well as decrease the chances to… Continue reading What is a Smurf Attack? How Does It Work?

How to Prevent a Rootkit Attack?

Maybe you’ve already heard somewhere the name rootkit. The name which comes from the Linux and Unix operating systems means the most privileged account admin that is called ” the root”. And the applications with the help of which a user can have admin-level access or unauthorized root access to the device are called the… Continue reading How to Prevent a Rootkit Attack?

20 Dangerous Types of Cybersecurity Threats

The cybersecurity threats in this year are more considerable than ever. Due to the emergence of efficient ransomware, coin miners, spyware, and so on, hacking has become a consistently profitable business. Knowing about cybersecurity threats is crucial because it livens up the safety measures. In addition, when you’re aware of what is up against you… Continue reading 20 Dangerous Types of Cybersecurity Threats

Russian Aviation agency switched to paper documents due to a hacker attack

The media, citing their own sources, report that at the end of last week, Russian Aviation agency suffered from a hacker attack, after which 65 TB of data was erased and it was necessary to temporarily switch to paper workflow. The Aviatorshchina Telegram channel was the first to report the attack, which wrote that as… Continue reading Russian Aviation agency switched to paper documents due to a hacker attack

Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times

This week, Akamai experts discovered a unique DDoS amplification vector that can achieve a 4.3 billion to one attack repelling or amplification ratio. The new attack vector is based on the abuse of unprotected Mitel MiCollab and MiVoice Business Express systems, which act as gateways between virtual PBXs and the Internet and have a dangerous… Continue reading Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times