Iranian Cyber Espionage Group Targets Defense Contractors with Novel Backdoor Malware

Cyber Espionage

Cybersecurity researchers at Microsoft have uncovered a targeted cyber espionage campaign orchestrated by the Iranian nation-state hacking group, APT33 (also known as Peach Sandstorm, HOLMIUM, or Refined Kitten). The campaign focuses on deploying a recently discovered backdoor malware, dubbed “FalseFont,” to compromise individuals working for organizations within the crucial Defense Industrial Base (DIB) sector. The […]

How Mac Users Can Protect Themselves from Proxy Trojan Malware Attacks

Mac Users

Cybersecurity experts have recently uncovered a new proxy trojan malware campaign targeting Mac users who download pirated software from warez sites.  The malware infects the users’ computers and turns them into proxy servers that cybercriminals can use to hide their identity and location while conducting malicious or illegal activities online. What is proxy trojan malware, […]

Samsung’s Auto Blocker: A New Way to Protect Galaxy Devices from Malware

Auto Blocker on Samsung's Galaxy Devices

Malware is a serious threat to any smartphone user, as it can compromise personal data, drain the battery, and slow down any device. That’s why Samsung has introduced a new security feature called ‘Auto Blocker’ as part of the One UI 6 update, offering enhanced malware protection on Galaxy devices. What is Auto Blocker? Users […]

Cyberthreats Around Valentine’s Day

Valentine’s Day is a time for love in any way, but it can also be a time of increased cyberthreats. Cybercriminals take advantage of this festivity to launch phishing and malware attacks and other attacks against unsuspecting victims. Know the top cyberthreats around Valentine’s Day and how to be protected from them. Read: The Hive […]

Learn the ransomware definition

Ransomware is a popular malware affecting Windows computers or Windows systems. However, it can also affect Mac systems and iOS devices. Ransomware continues to grow; it has been recognized as viral since 2000 but, in reality, it has had many types of victims for more than 30 years. It is considered that the first attack […]

Emails with fake resumes are used to distribute malware

Every day, users receive many emails of different kinds. In corporate accounts, it is not surprising that emails arrive with attachments associated with work, so it is difficult to suspect them. However, since they are associated with the organization’s internal network, you must be careful when you open them. The latest move from cybercriminals is […]

Emonet malware now attacks Chrome Browser

Emonet malware was widely named during the year 2020. However, after a major operation by the authorities, the attack infrastructure of this Trojan was dismantled. At the end of 2021, it appeared again, and this year it has been very active. It is currently attacking Chrome to steal users’ credit card information, which Google’s browser […]

Hackers Are Using Cloud Services to Spread Malware

Hackers are using cloud services offered by companies like Amazon and Microsoft to successfully distribute malware, such as remote access Trojans known as Nanocore, Netwire, and AsyncRAT, gaining access to systems and compromising information. Read all about this new method in this article. Read: Google Chrome is Patching Several Vulnerabilities Cloud services are the perfect […]

Meet BotenaGo, The New Malware

This year, malware has presented concerning numbers; the attacks continue to increase even when the world now understands the real importance of cybersecurity. Despite all the efforts, there will be a new malware every few months. This time, BotenaGo is the one causing havoc with routers and IoT devices. Keep reading to know all about […]

GriftHorse is the new malware to steal bank information

GriftHorse is the new malware that is causing trouble for users of Android smartphones. This is not the first or last malware that could appear on those devices. However, this can cause many damages, not only monetarily, but also the constant notifications and different features that activate on them. Keep reading to find out more! […]