Redline and Vidar Stealers Switch to Ransomware Delivery

In addition to spreading stealer malware, hackers started to deploy ransomware through the same channels

Cybercriminals who stand behind RedLine and Vidar stealers decided to diversify their activity. Now, crooks deploy ransomware, using the same spreading techniques as they used to deliver their spyware. Meanwhile, the process of ransomware enrollment is rather unusual and is full of advanced evasion techniques. What are Redline and Vidar Stealers? RedLine is an infostealer… Continue reading Redline and Vidar Stealers Switch to Ransomware Delivery

What is Whaling Phishing and How To Recognize and Avoid It?

Whaling is a phishing that aims high-profile people in different companies and organizations.

Malicious actors know executives and high-level employees, such as public spokespersons, are familiar with common spam tactics. Due to their public profiles, they may have undergone extensive security awareness training, and the security team may have implemented stricter policies and more advanced tools to safeguard them. As a result, attackers targeting these individuals are forced… Continue reading What is Whaling Phishing and How To Recognize and Avoid It?

3AM Ransomware Backs Up LockBit In Cyberattacks

LockBit cybercrime group introduced the backup malware for their cyberattacks

Cybersecurity researchers have discovered a new family of ransomware called 3AM. Attackers attempted to use it as an alternative attack method during the failed LockBit deployment. 3AM Ransomware – The Fallback Variant of LockBit According to a recent report, cybersecurity experts have discovered a new type of ransomware known as 3AM. Since this ransomware has… Continue reading 3AM Ransomware Backs Up LockBit In Cyberattacks

What Is Identity Theft & How to Protect Against It

Identity theft is a cybercrime where an individual's personal information is stolen and used by someone else for fraudulent purposes.

Identity theft is a significant issue affecting millions yearly, whether through stolen credit card information or fraudulent accounts. It’s a lucrative business for criminals, who can steal billions of dollars annually through these methods. Unfortunately, data breaches are a common occurrence, and they contribute to the problem. While it’s impossible to prevent data breaches, there… Continue reading What Is Identity Theft & How to Protect Against It

Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Using specifically crafted WebP images, hackers can initiate CVE-2023-4863 vulnerability exploitation

Google released an urgent security update for its Chrome browser. The patch contains the fix for CVE-2023-4863, a heap buffer overflow vulnerability that can simply be exploited. Actually, Google states that this vulnerability has already been used in the wild. The breach affects browser builds for all supported OS – Mac, Linux and Windows. Google… Continue reading Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Spyware in Fake Telegram Apps Infected Over 10 million Users

Downloading fake Telegram apps can result in the loss of sensitive data

It is important to exercise caution when using messenger mods. There have been reports of spyware disguised as modified versions of Telegram on the Google Play Store. This malware designed to extract sensitive information from compromised Android devices. Despite these risks, many users still blindly trust any app verified and published on Google Play. We… Continue reading Spyware in Fake Telegram Apps Infected Over 10 million Users

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

W3LL started with a mass emailing tool and now has a comprehensive phishing attack kit.

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable assets. One such threat that has recently garnered significant attention is “W3LL.” Next, we will tell you what it is, what it is known for, and how it succeeded in its business over 6 years… Continue reading W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

Can Zero-Day Attacks Be Prevented With Patches?

Patches to 0-day breaches are offered as a magic pill. But are they?

In recent years, zero-day exploits and attacks have become prominent emerging threats. These attacks take advantage of unknown vulnerabilities within software, which makes them almost impossible to detect and prevent. Zero-day attacks can have dire consequences, allowing attackers to take control of systems, steal data, or install malware. What is a Zero-Day attack? A zero-day… Continue reading Can Zero-Day Attacks Be Prevented With Patches?

QakBot Botnet Dismantled, But Can It Return?

QakBot fell. But for how long?

On Tuesday, the US authorities announced that as a result of the international law enforcement operation “Duck Hunt,” the infamous Qakbot malware platform, which is linked to Russia, was destroyed. Cybercriminals actively use it to commit various financial crimes. Though, cybersecurity experts are not sure how deadly this operation was to the botnet. They predict… Continue reading QakBot Botnet Dismantled, But Can It Return?

Chae$4 Malware Released, Targets Banking & Logistic Orgs

A new cyber threat is on the horizon. But how actually dangerous Chae$4 malware is?

Cybersecurity experts have discovered a new variant of Chaes malware called “Chae$4”. This malware targets the banking and logistics industries and significant content management platforms. New Chae$4 Malware Targets Banking and Logistic Industries. According to a report, researchers have discovered an advanced variant of Chaes malware that predominantly targets e-commerce customers in Latin America. Chae$4… Continue reading Chae$4 Malware Released, Targets Banking & Logistic Orgs