What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

Stealthy ‘WIRTE’ Gang Targets Middle Eastern Governments

Kaspersky researchers suspect that the cyberattackers may be a subgroup of the politically motivated, Palestine-focused Gaza Cybergang. A threat actor tracked as WIRTE has been assaulting Middle East governments since…

How Decryption of Network Traffic Can Improve Security

Most industry analyst firms conclude that between 80-90 percent of network traffic is encrypted today. Jeff Costlow, CISO at ExtraHop, explains why this might not be a good thing. Strong…

300,000 Android users impacted by malware apps on Play Store

In total, 4 different banking trojan malware disguised as cryptocurrency apps, QR code readers, PDF scanners, fitness monitors, etc. were identified on the Play Store. Android smartphone users must beware…

Over 300,000 Android users have downloaded these banking trojan malware apps, say security researchers

Over 300,000 Android smartphone users have downloaded what have turned out to be banking trojans after falling victim to malware which has bypassed detection by the Google Play app store. …

Malicious JavaScript Loader is a Multi-RAT Dispenser

Malicious JavaScript Loader is a Multi-RAT Dispenser Researchers are warning of a new JavaScript loader being used to distribute eight Remote Access Trojans (RATs) in information-stealing campaigns. A team at…

Linux Malware and Web Skimmer Deployed on E-commerce Servers

It seems that malicious actors are now installing a Linux backdoor on hacked e-commerce infrastructure., that works by having a PHP-coded web skimmer inserted and disguised as a.JPG picture file,…

Malicious PyPl Packages Downloaded 40,000+ Times

Malicious PyPl Packages Downloaded 40,000+ Times Researchers have discovered 11 new malicious open-source packages using various advanced techniques to avoid detection on the popular PyPl repository. Python’s official third-party software…

College for cyber criminals: Dark web crooks are teaching courses on how to build botnets

Botnets are one of the key drivers of cyberattacks, used to distribute malware, ransomware and other malicious payloads – and dark web forums are now offering lessons on how to…

Redline stealer malware: Full analysis

Redline malware was first observed in March 2020, but it continues to be the most prominent cyber threat impacting users worldwide in 2021. According to the AnyRun trend tracker, 1,473…