Pentesters Wanted for Ransomware Attacks!

The Russian Advanced Persistent Threat (APT) group FIN7 is trying to break into the lucrative ransomware market by creating bogus cybersecurity organizations that perform network attacks under the pretense of…

Webhards and Torrents: the New Channels for RAT Malware Propagation in Korea

South Korea seems to be a target of a new malicious campaign that propagates RAT malware camouflaged into a game for adults. The way it is distributed happens via torrents…

Macaw Locker, Evil Corp’s Latest Version Makes New Victims

In order to avoid US sanctions that avert victims from paying ransom demands, Evil Corp threat actor has released a new ransomware dubbed Macaw Locker. About Evil Corp Also known as the…

YouTube Used to Push Password-Stealing Malware

A Trojan is a type of malware that acts according to the Greek legend, as it camouflages itself as a legitimate file or program to trick unsuspecting users into installing…

Network Computing Awards 2021: Heimdal™ Wins Best Cloud-Delivered Security Solution

Great efforts pay off! We are very proud and thrilled to announce that Heimdal™ won first place in the Cloud-Delivered Security Solution of the Year category at the Network Computing…

C2 Communication Is Enabled via WebSockets in a Fresh PurpleFox Botnet Version

PurpleFox botnet, the well-known Dirty Moe, goes on and develops more vulnerability exploits and payloads. The fresh news on this botnet shows how this time it establishes C2 communication via…

Distributed Denial of Service Attacks Against Russia Have Tripled

Distributed Denial of Service, otherwise known as DDoS attacks are online attacks in which legitimate users are prevented from accessing their target online location. The attack happens by flooding the…

Russian Threat Actors Tempt YouTubers with Bogus Paid Collaborations to Hijack their Accounts

According to Google, YouTube influencers have been targeted with password-stealing malware in a phishing campaign allegedly conducted by Russian-speaking cybercriminals. Security experts with Google’s Threat Analysis Group (TAG), who first…

Gummy Browsers: The New Cyberattack Developed by Researchers

Academic experts from a U.S. university designed a new type of cyberattack dubbed Gummy Browsers. Its main characteristics include the capturing of fingerprints and also tricking the browser. Gummy Browsers…

Hacker Exploits an Old Microsoft Office Vulnerability to Deliver RATs

Cybersecurity researchers have recently come across an unknown threat actor conducting a crimeware operation in which it attacks organizations in India and Afghanistan using political and government-themed malicious domains. As…