Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

Malware Campaigns Deliver Payloads Via Obscure Paste Service
Malware Campaigns Deliver Payloads Via Obscure Paste Service
Malware Campaigns Deliver Payloads Via Obscure Paste Service
Malware Campaigns Deliver Payloads Via Obscure Paste Service

Malware Campaigns Deliver Payloads Via Obscure Paste Service

Malware Campaigns Deliver Payloads Via Obscure Paste Service Multiple malware campaigns have been spotted using Pastebin-style services to facilitate their nefarious activities. Instead of delivering payload from a dedicated Command-and-Control (C&C) server, paste sites enable attackers to hide their malicious code in plain sight. This week Juniper Threat Labs have identified malware campaigns relying on

Ransomware Threat Surge, Ryuk Attacks About 20 Orgs Per Week

Ransomware Threat Surge, Ryuk Attacks About 20 Orgs Per Week Malware researchers monitoring ransomware threats noticed a sharp increase in these attacks over the past months compared to the first six months of 2020. At the top of the list are Maze, Ryuk, and REvil (Sodinokibi) ransomware families, according to recently published data from Check

MosaicRegressor: Second-ever UEFI Rootkit Found In The Wild

MosaicRegressor: Second-ever UEFI Rootkit Found In The Wild The second-ever UEFI rootkit used in the wild was found by security researchers during investigations surrounding attacks from 2019 against two non-governmental organizations (NGOs). UEFI (Unified Extensible Firmware Interface) firmware allows for highly persistent malware given that it’s installed within SPI flash storage soldered to a computer’s motherboard making

Crypto-mining Malware Adds Linux Password Stealing Capability

Crypto-mining Malware Adds Linux Password Stealing Capability The TeamTNT cybercrime group has recently updated its crypto-mining worm with password-stealing capabilities and with an additional network scanner to make it easier to spread to other vulnerable devices. While known mostly for actively targeting Docker instances to use compromised systems for unauthorized Monero (XMR) mining, the group

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us