Tag: Trojan

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX last month…

Vladimir Krasnogolovy

Mobile Malware Threat Landscape — 2022 Summary

Today, a smartphone is much more than just a way to reach…

Stephanie Adlam

Reverse Shell vs. Backdoor : What is the Differences?

Backdoor and Reverse Shell are very similar, which may lead you to…

Stephanie Adlam

Hackers Compromise Comm100 Live Chat to Attack a Supply Chain

The official installer of the Comm100 Live Chat SaaS application, which is…

Vladimir Krasnogolovy

Developer of CodeRAT Trojan Releases Source Code

The source code for the CodeRAT remote access trojan has been published…

Vladimir Krasnogolovy

TrickBot Hack Group Systematically Attacks Ukraine

IBM Security X-Force experts noticed that from the very beginning of the…

Vladimir Krasnogolovy

ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers

Lumen Black Lotus Labs has discovered a new Remote Access Trojan (RAT)…

Vladimir Krasnogolovy

Facts to Remember About Trojan Malware

In this article, we will consider one of the vilest, most unpleasant,…

Stephanie Adlam

Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure

Europol announced that law enforcement officers, as a result of an international…

Vladimir Krasnogolovy

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

An unknown hacker attacked German users who are interested in information about…

Vladimir Krasnogolovy

20 Dangerous Types of Cybersecurity Threats

The cybersecurity threats in this year are more considerable than ever. Due…

Stephanie Adlam

Microsoft patches Windows AppX Installer vulnerability that spreads Emotet malware

The latest of this year, December's patch Tuesday brought fixes for six…

Vladimir Krasnogolovy

AI Assistant

Hello! 👋 How can I help you today?