AcidBox – VirtualBox Exploit
In 2014 a new threat actor entered the playing field, where Estonian intelligence believes the group to have Russian origins and operates on the behalf... Read More
In 2014 a new threat actor entered the playing field, where Estonian intelligence believes the group to have Russian origins and operates on the behalf... Read More
The Treck IP network stack software is designed for and used in a variety of embedded systems. First created in the 1990’s, the software can... Read More
On June 10th, FortiGuard Labs discovered a malicious spam campaign that is taking advantage of the current “Black Lives Matter” protests in order to target... Read More
Researchers at Check Point Research have analyzed CloudEyE, an evolved version of DarkEyE. Which allows threat actors to use different types of malware of their... Read More
An Android Trojan nicknamed “Joker” has recently been making its way into the Google Play Store. Also known as Bread Trojan, it is a malware... Read More
In late January 2020, Insikt Group came across Ransomware-as-a-Service (RaaS) being sold on underground forums called ‘Thanos’, developed by an unknown actor named ‘Nosophoros’. This... Read More
First appearing in the cyber security scene in 2013, Russia-linked hacker group, Gamaredon, has created a new malware spreading module that utilizes Microsoft Outlook. The... Read More
Prevailion’s Tailored Intelligence Team has detected a new campaign they named “The Gh0st Remains the Same.” They believe this campaign began between May 11th and... Read More
Pipemon is a newly discovered backdoor malware that, once installed and executed on a target machine, is capable of sending: The victims RDP (remote desktop... Read More
First discovered in 2016, TrickBot is mainly used as an information stealer and a backdoor for other malware that attackers may wish to deploy on... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..