Muhstik Botnet Evolves to Attack Tomato Routers
The Muhstik botnet has been around since March of 2018 and has capabilities to infect Linux servers and Internet-of-Things (IoT) devices, thanks to its wormlike,... Read More
Cyber threats refer to the actors and actions attempting to execute successful cyber attacks aimed at gaining unauthorized access, damaging, disrupting, or stealing information technology assets, computer networks, intellectual property, personally identifiable information, or any other form of sensitive data. Cyber threats can originate from within an organization by trusted users or from outside the organization by external malicious actors. This page provides information on some of the cyber threats that Atlas Cybersecurity is tracking.
The Muhstik botnet has been around since March of 2018 and has capabilities to infect Linux servers and Internet-of-Things (IoT) devices, thanks to its wormlike,... Read More
Since the rise of the COVID-19 pandemic, many organizations have begun to utilize Microsoft Teams and other messaging platforms to coordinate their ‘work-at-home’ employees and... Read More
Emotet is malware, specifically it is a trojan that is spread through spam emails. It is used by multiple threat actors who purchase access to... Read More
macOS Bundlore, also known as Crossrider, is a family of deceptive software installers that allow hackers to bundle adware-type applications (such as CinemaPlusPro, FlashMail, MyShopCoupon,... Read More
Check Point Research has published a report detailing an on-going cyber fraud operation led by threat actors in Gaza, West Bank, and Egypt that compromises... Read More
The newly discovered Firestarter malware uses Google Firebase Cloud Messaging to notify its authors of the final payload location. This allows the malware authors to... Read More
The Russian sponsored APT known as Berserk Bear, Energetic Bear, TeamSpy, or Dragonfly has conducted a campaign against a wide range of U.S. based targets.... Read More
T-RAT, an infamous trojan malware capable of covert surveillance, backdoor for administrative control and unfettered an unauthorized remote access to a victim’s machine. Known generally... Read More
Cybersecurity firm Rapid7 has released a report detailing ten new address bar spoofing vulnerabilities found across seven mobile browser applications. These vulnerabilities stem from a... Read More
Made in Oregon, an Oregon-based retailer, has suffered a data breach that has resulted in the release of sensitive, customer information, including their payment card... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..