Malware

Beware! Jackal Malware Becomes a Master at Manipulation screenshot

Beware! Jackal Malware Becomes a Master at Manipulation

A notorious Advanced Persistent Threat (APT) group named GoldenJackal has recently developed a potent collection of .NET malware tools known as Jackal. This malicious toolset, comprising various components like... Read more

May 24, 2023
Horse Shell Malware Targets Wide Range of Routers screenshot

Horse Shell Malware Targets Wide Range of Routers

Check Point Research, a group of cybersecurity researchers, has discovered a hazardous Chinese malware capable of infecting your home or office router. Referred to as "Horse Shell," this backdoor enables malicious... Read more

May 18, 2023
What is Acwzmain.accde Malware? screenshot

What is Acwzmain.accde Malware?

Acwzmain.accde is a genuine file developed by Microsoft for Windows systems and is usually located in C:\Program Files (x86)\Microsoft Office\root\Office16\ACCWIZ\ACWZMAIN.ACCDE. However, certain trojans can... Read more

May 3, 2023
EvilExtractor Malware Seeks to Steal Data screenshot

EvilExtractor Malware Seeks to Steal Data

EvilExtractor is a malicious tool that targets Windows operating systems to extract data and files from endpoint devices. Its modules operate through an FTP service and were developed by a company named Kodex, which... Read more

April 24, 2023
Beware of 'Estimate Speed Up' Rogue Optimization App screenshot

Beware of 'Estimate Speed Up' Rogue Optimization App

Estimate Speed Up is a program that falls under the category of potentially unwanted programs. This software claims to optimize your computer by scanning it for invalid entries, broken links, and other issues that... Read more

April 11, 2023
Rilide Stealer Targets the Chromium Platform screenshot

Rilide Stealer Targets the Chromium Platform

A new malware known as Rilide has been discovered, which targets Chromium-based web browsers. This malware disguises itself as a legitimate Google Drive extension to gather sensitive information and siphon... Read more

April 6, 2023
Why TurkoRat Remote Access Tool is Extremely Dangerous on Your Computer screenshot

Why TurkoRat Remote Access Tool is Extremely Dangerous on Your Computer

In the realm of cybersecurity, new threats emerge regularly, targeting unsuspecting users and organizations alike. One such threat is TurkoRat, a versatile malware that functions as a Trojan horse, password-stealing... Read more

May 24, 2023
DownEx Malware Used in Espionage Campaign screenshot

DownEx Malware Used in Espionage Campaign

A new type of malware called DownEx has been discovered by Romanian cybersecurity researchers. It is being used in a sophisticated espionage campaign that is targeting government organizations in Central Asia, with... Read more

May 12, 2023
LOBSHOT Malware Used in Malvertising Campaign screenshot

LOBSHOT Malware Used in Malvertising Campaign

Earlier this year, Elastic Security Labs, in collaboration with the research community, detected a significant rise in the use of malvertising. Attackers utilized a sophisticated strategy of creating phony websites... Read more

May 2, 2023
SnowyAmber Malware Leveraged by Russian Cyberspies To Attack NATO & EU Organizations screenshot

SnowyAmber Malware Leveraged by Russian Cyberspies To Attack NATO & EU Organizations

In recent cybersecurity news sources, it was reported that Russian cyberspies had launched a new malware toolset, which they used to target NATO and European Union (EU) organizations. The malware toolset has been... Read more

April 14, 2023
'Global PC Cleaner Pro' Trips Up Malware Detections screenshot

'Global PC Cleaner Pro' Trips Up Malware Detections

Global PC Cleaner Pro is marketed as a software tool that is designed to optimize a computer's performance by cleaning up unnecessary files and programs that may slow down its speed. However, upon investigating this... Read more

April 10, 2023
Trojan:Win32/Casdet!rfn Malware Detection & Removal screenshot

Trojan:Win32/Casdet!rfn Malware Detection & Removal

Trojan:Win32/Occamy.C hacktool is a type of malware that often remains undetected on a user's device. While it may not show any obvious signs of its presence, the user may begin to notice changes in the performance of... Read more

April 5, 2023
Minas is a Multi-Stage Cryptominer Malware screenshot

Minas is a Multi-Stage Cryptominer Malware

Minas, a malicious software designed for cryptocurrency mining, is an insidious threat that exploits the XMRIG application, originally intended for legitimate Monero mining. This particular type of malware exerts... Read more

May 19, 2023
RoarBAT Malware Spotted by Ukrainian CERT screenshot

RoarBAT Malware Spotted by Ukrainian CERT

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported an ongoing phishing campaign that uses invoice-themed lures to spread the SmokeLoader malware. The emails are sent from compromised accounts and... Read more

May 10, 2023
RustBucket Mac Malware Attributed to BlueNoroff Threat Actor screenshot

RustBucket Mac Malware Attributed to BlueNoroff Threat Actor

Jamf, a mobile device management company, has identified a new malware called RustBucket that is being used to target Apple devices. The malware is believed to be associated with the BlueNoroff advanced persistent... Read more

April 26, 2023
Balada Injector Malware Targets Websites Using WordPress screenshot

Balada Injector Malware Targets Websites Using WordPress

According to GoDaddy's Sucuri, a massive campaign named Balada Injector has infected more than one million WordPress websites with malware since 2017. The attackers use various methods and vulnerabilities to breach... Read more

April 11, 2023
CryptoClippy Malware Works as a Stealer screenshot

CryptoClippy Malware Works as a Stealer

CryptoClippy is a form of malware that functions as a cryptocurrency clipper. Its main objective is to monitor the user's clipboard and detect instances where the user copies a cryptocurrency wallet address. Once... Read more

April 10, 2023
OpcJacker Malware Uses Fake VPN to Spread screenshot

OpcJacker Malware Uses Fake VPN to Spread

Since the second half of 2022, cybersecurity experts have identified a new form of malware that steals information called OpcJacker. According to researchers from Trend Micro, this malware can perform a variety of... Read more

April 4, 2023
Loading...