FoggyWeb, analysis of a Nobelium backdoor
Microsoft’s Threat Intelligence Center has been analyzing a custom-built backdoor that has been used by the Nobelium group since April...
Microsoft’s Threat Intelligence Center has been analyzing a custom-built backdoor that has been used by the Nobelium group since April...
pcTattleTale hasn’t been very careful about securing the screenshots it sneakily takes from its victims’ phones. pcTattleTale markets itself as...
Positive Technologies is developing a new concept of cyber security standard. The document should become an open knowledge base, which...
At least five French ministers and President Emmanuel Macron's diplomatic advisor mobile phones have been infected by Israel-made Pegasus spyware,...
Covid-19 pandemic has turned the world upside down in the last year and a half, leaving us with no option...
Bitcoin.org, the authentic website of the Bitcoin project was hacked by criminals who advertised a double your money scam and...
FinSpy, also known as FinFisher or Wingbird, is an infamous surveillance toolset. Kaspersky has been tracking deployments of this spyware...
LittleCorporal: A C# Automated Maldoc Generator C:LittleCorporalbinRelease>LittleCorporal.exe C:beacon.bin explorer.exe.____ .__ __ __ .__ _________ .__| | |__|/ |__/ |_| |...
SharpSpray is a Windows domain password spraying tool written in .NET C#. IntroductionSharpSpray is a C# port of DomainPasswordSpray with...
An exploit for the recently disclosed CVE-2021-22005 vulnerability in VMware vCenter was publicly released, threat actors are already using it....
Microsoft discovered new custom malware, dubbed FoggyWeb, used by the Nobelium cyberespionage group to implant backdoor in Windows domains. Microsoft...
ERMAC is a new Android banking Trojan that can steal financial data from 378 banking and wallet apps. Researchers from...
Researchers spotted a new malware, dubbed BloodyStealer, that could allow stealing accounts for multiple gaming platforms. Researchers from Kaspersky have...
Researchers from the Italian cybersecurity firm Shielder found a remote code execution vulnerability in Visual Studio Code Remote Development Extension....
Summary: Use-after-free vulnerability in kernel graphics driver because of storing an invalid pointer in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial...
Summary: SAP Business One, version - 10.0, allows a local attacker with access to the victim's browser under certain circumstances,...
Summary: SAP Business One, version - 10.0, allows an attacker with business authorization to upload any files (including script files)...
Summary: SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be...
Summary: The Service Layer of SAP Business One, version - 10.0, allows an authenticated attacker to invoke certain functions that...
Last week on Malwarebytes Labs Freedom Hosting operator gets 27 years for hosting dark web abuse sitesMicrosoft makes a bold...
From the beginning of the year to the end of August, losses due to cryptocurrency investment scams accounted for over...
According to experts, the share of malicious bots has been growing for a long time, but the pandemic has accelerated...
Authorities in Spain have issued a warning about a phishing campaign that impersonates WhatsApp to deceive consumers into installing a...
IBM Security researchers have discovered a new form of overlay malware targeting online banking users. Dubbed ZE Loader, is a...