Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Command-and-Control

SocGholish malware is distributed through advertising tools and provides access to various groups such as LockBit and Evil Corp.
Cybercrime Operations | Malware Distribution | Traffic Distribution Systems

SocGholish malware is distributed through advertising tools and provides access to various groups such as LockBit and Evil Corp.

Malicious Go and npm packages are spreading cross-platform malware that can initiate remote data erasure.
Cross-Platform Vulnerabilities  | Malicious Software | Supply Chain Risks

Malicious Go and npm packages are spreading cross-platform malware that can initiate remote data erasure.

Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.
Command and Control Techniques  | Cybersecurity Threats | Web Conferencing Exploits

Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.

Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.
Cybersecurity Threats | Malware Distribution Techniques  | Social Engineering Tactics

Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.

Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.
Credential Harvesting  | Remote Access Tools  | Social Engineering

Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.

Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Advanced Persistent Threats  | Cybersecurity Threats | Malware Distribution Techniques 

Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.

UAC-0099 Hackers Exploiting HTA Files to Distribute MATCHBOIL Loader Malware
Cyber Warfare | Malware Development | Phishing Attacks 

UAC-0099 Hackers Exploiting HTA Files to Distribute MATCHBOIL Loader Malware

Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.
Cybersecurity Threats | Malware Development | Vulnerability Exploitation

Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.

Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks 

Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.

APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
Credential Theft  | Cybersecurity Threats | Phishing Campaign

APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information

Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Cybersecurity Threats | Malware Distribution Techniques  | Social Engineering Tactics

Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.

Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.
Evasion Strategies  | Exploitation Techniques | Malware Threats 

Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.

A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.
Cybersecurity Threats | Incident Response Challenges  | Ransomware Tactics

A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.

A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.
Cybercrime | Data Theft | Malware Techniques 

A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.

The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.
Cybersecurity

The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search