LATEST

New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations

New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations

CYBER ATTACKZerowl

FamousSparrow is connected to a cyberattack that targeted a Mexican research institute and a trade association in the United States. The threat actor launches a web shell on an Internet Infor

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

CYBER ATTACKZerowl

The Goot loader malware targets users who are looking into whether Bengal cats are legal in Australia. When victims search for specific terms, such as legal documents, the malware is installe

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

CYBER ATTACKZerowl

Telegram is used as a command-and-control (C2) communication mechanism in a new Golang-based backdoor. It may have Russian roots, according to Netskope Threat Labs. Malware is made to detect

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

CYBER ATTACKZerowl

A recent malware campaign uses a Linux virtual instance with a backdoor to infect Windows systems. Codenamed CRON#TRAP, the "intriguing" campaign begins with a malicious Windows shortcut (LNK

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

CYBER ATTACKZerowl

A new strain of Android banking malware has infected more than 1,500 Android devices. Threat actors can carry out fraudulent banking transactions thanks to ToxicPanda. The malware is thought

Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts

Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts

CYBER ATTACKZerowl

Microsoft is drawing attention to Storm-2372, an emerging threat cluster. Since August 2024, it has been linked to a fresh wave of cyberattacks targeting various industries. In Europe, North

Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

CYBER ATTACKZerowl

Kaspersky: Lazarus Group took control of compromised devices by using a zero-day exploit. The vulnerability in question is CVE-2024-4947, a type confusion bug that Google fixed in the middle

Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals

Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals

CYBER ATTACKZerowl

Pay2Key is a ransomware-as-a-service (RaaS).Following the Israel-Iran-US conflict, I2P has reappeared. The financially motivated scheme is believed to be connected to a hacking group known as

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

CYBER ATTACKZerowl

According to a Russian cybersecurity vendor, the attacks have targeted 65 victims across 26 countries. The attack chains entail inserting keylogger code into the login page by taking advantag

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System

CYBER ATTACKZerowl

Google alerts users to a security vulnerability affecting its Android operating system that is currently being actively exploited in the wild. A privilege escalation flaw in the Android Frame

Top 5 this week

Page 194 of 202