Detect and Prevent Fraud, Data Leaks and Advanced Internal as well as External Attack for Cyber Infrastructure with Security Orchestration, Automation and Response
Researchers have identified a new campaign targeting enterprise user with fake business emails to deliver NetWire RAT. First discovered in 2012, the malware has been constantly upgraded by its developers...[ read more ]
A new ransomware called ACKO has been spotted in the wild, being delivered to its victim as an attachment in spam mails. During the initial analysis of the ransomware, researchers...[ read more ]
A hacking campaign, utilizing custom built, python based trojan “PyXie“, has been identified targeting healthcare & education organization. The trojan gives the attacker almost full control of the windows machine,...[ read more ]
A new information stealing malware, dubbed Raccoon, has gained a lot of popularity among cybercriminals in a short span. Written in C++ & developed to compromise both 32 & 64-bit...[ read more ]
Phoenix, a keylogger, which has now evolved into an infostealer, is being sold as malware-as-a-service by its authors and has started gaining traction among cyber-criminals. The malware is being utilized...[ read more ]
Researchers have discovered a new malspam campaign, delivering payloads such as spyware (Negasteal or Agent Tesla) and RAT (Warzone or Ave Maria). Threat actors behind the campaign are making use...[ read more ]
Security researchers have identified a new malspam campaign targeting German organizations, delivering the Buran Ransomware. The email is crafted to appear to be coming from online fax service eFax. ...[ read more ]
Researchers have observed cybercrime group ‘TA505’, using a new RAT dubbed SDBbot, being delivered via GET2 downloader in recent attacks. The G2 downloader has been previously used in various campaigns...[ read more ]
Security Researchers have discovered a new malware dubbed Reductor, capable of decoding encrypted TLS communication without the need to manipulate/intercept it. The malware makes it way to systems via:- Software’s...[ read more ]
APT hackers from China are utilizing FakeNarrator malware to attack tech companies based in Southeast Asia, in order to implant a modified version of PcShare backdoor, which is designed to...[ read more ]