Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat
This post was authored by Hossein Jazi On December 7 2020 we identified a malicious document uploaded to Virus Total...
This post was authored by Hossein Jazi On December 7 2020 we identified a malicious document uploaded to Virus Total...
“What now? My farm is no longer working. Can you have a look, honey?” Like millions of other people my...
Previously, US President Donald Trump had accused China of malicious security incidents; security experts and officials have suspected China...
Juspay, the payment processor of prime online merchants like Amazon and Swiggy was hit by a massive data breach and...
In Russia, the number of cyber attacks increased by almost a quarter in the first quarter of 2020, said Anton...
Cutting off the internet and its services has become a trend in a country like India. The government claims that...
NameSouth is by all accounts the most recent casualty of the ransomware group that surfaced at some point in 2019....
The all-in-one Red Team browser extension for Web PentestersHackTools, is a web extension facilitating your web application penetration tests, it...
Improvements made to the Goals and SLAs wizardWe’re excited to announce that creating a goal or SLA in InsightVM just...
Researchers uncovered a malspam campaign that spreads the QNode remote access Trojan (RAT) using fake Trump’s sex scandal video as...
Threat actors are attempting to hack Zyxel devices exploiting the recently disclosed vulnerability CVE-2020-29583, security researchers warn. The Taiwanese vendor...
A joint statement issued by US security agencies confirmed that Russia was likely the origin of the SolarWinds supply chain...
Researchers uncovered a large scale operation targeting cryptocurrency users with a previously undetected multiplatform RAT named ElectroRAT. Security researchers from...
Researchers have found a new remote access trojan (RAT) written from scratch in Golang that lures cryptocurrency users to download...
I won’t reveal my mom’s exact age, but she’s in her late 60s. Other than her phone, my mom doesn’t...
During the Covid-19 pandemic, educational institutions, health agencies, and other significant organizations have suffered the most from cyberattacks. As if...
More than 250 US Federal Agencies and big companies have been attacked by alleged state-sponsored Russian hackers. The attackers gained...
The e-commerce giants, with their evidently endless collection and drive to deliver convenience along with affordable prices, have become an...
The data of 10 Crore Indian cardholders has been sold on the Dark Web for an unknown amount. The information...
Technology and networking have turned out to be the need of the hour and we must also be equally qualified...
MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com).Legal Disclaimer:Usage of MaskPhish for...
drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
According to a new report published by Check Point, organizations in the healthcare industry have faced a 45% increase in...