The City of Dallas suffered a ransomware attack by the Royal group, jeopardizing sensitive data and public safety. The attack showcased the rising threat of partial encryption, emphasizing t… Read More
Malware distribution methods have changed significantly in the cyber threat landscape. Data analysis shows that Microsoft Office document files are no longer the preferred medium for deliver… Read More
In our digitally connected world, safeguarding our online presence has become a top priority. Cybersecurity, the art of protecting our electronic systems and data from malicious attacks, is… Read More
A cyber security company has found a new stealth phishing campaign that has targeted education and healthcare industries the most in September 2023. According to a report, an information… Read More
In the latest PLAY cyber attack, six organizations have been victimized. The affected entities span across different regions, including the United States, the United Kingdom, and Norway.
Th… Read More
Spectating the Trojan:Win32/Convagent.AJ!MTB malware detection means that your PC is in big danger. This computer virus can correctly be named as ransomware – type of malware which cip… Read More
Spectating the Win32/Patched.NKM malware detection means that your computer is in big danger. This virus can correctly be named as ransomware – virus which encrypts your files and asks… Read More
In today’s digital landscape, cybersecurity is a critical concern for organizations of all sizes. Malicious actors are constantly evolving their tactics to bypass traditional security… Read More
30/08/2023A botnet refers to a group of internet-connected devices, which have been infected by a malware, and have come under the control of a malicious actor.
Botnet, which is a portmante… Read More
How often do cyberattacks happen? How frequently do threat actors target businesses and governments around the world? The BlackBerry® Threat Research and Intelligence Team recently analy… Read More
A Check Point Research (CPR), divisão de Inteligência em Ameaças da Check Point Software Technologies Ltd. uma fornecedora líder de soluções de… Read More
The operators affiliated with the QakBot (also known as QBot) malware have recently established 15 new command-and-control (C2) servers, marking a noteworthy development in the evolving land… Read More
August 04, 2023 - The medical care area kept on confronting a high volume of cyberattacks in the beyond couple of months as infostealing malware rose in ubiquity, BlackBerry expressed in its… Read More
The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC) module that's used for post-compromise activity on hacked systems, new findings from… Read More
Spectating the Trojan.Win32.Zolk detection name usually means that your system is in big danger. This virus can correctly be identified as ransomware – type of malware which encrypts y… Read More
A new malware strain has been found covertly targeting small office/home office (SOHO) routers for more than two years, infiltrating over 70,000 devices and creating a botnet with 40,000 nod… Read More
Check Point Software Technologies has published its Global Threat Index for June 2023.
Researchers found that the Trojan Qbot has been the most prevalent malware so far in 2023, ranking f… Read More
A new strain of JavaScript dropper has been observed delivering next-stage payloads like Bumblebee and IcedID.Cybersecurity firm Deep Instinct is tracking the malware as PindOS, which… Read More
New research provides an in-depth analysis of the modern attack chain and today’s biggest threats
Proofpoint, Inc., a leading cybersecurity and compliance company, today releas… Read More
The Royal ransomware group has initiated trials for a new encryptor named BlackSuit, exhibiting striking resemblances to their existing encryptor.
Originating in January 2023, Royal is re… Read More
Spectating the Ransom.Agent.RVED detection name usually means that your system is in big danger. This malware can correctly be identified as ransomware – sort of malware which ciphers… Read More
Seeing the Trojan:Win32/Zenpack!ic detection means that your PC is in big danger. This virus can correctly be named as ransomware – type of malware which encrypts your files and asks y… Read More
Banking trojans have become a big hazard in an age when we do all of our financial activities online. Banking trojans, as the name implies, are viruses designed to steal sensitive financial… Read More
Depois de uma pausa de quase três meses, as atividades do grupo de malware Emotet voltaram a surgir pela internet. Durante o início desta semana, a infraestrutura do malware v… Read More
A malicious spam-email campaign has been observed increasingly spreading banking Trojans from the QBot (or Qakbot) family using fake business emails.Discovered by security researchers at Kas… Read More
Check Point Research reports that Emotet Trojan launched a new campaign last month to evade Microsoft’s macro block, sending spam emails containing malicious OneNote files. Meanwhile A… Read More