ReverseRat Trojan from Pakistan compromises Indian Power Company
As per the security researchers, a new remote access Trojan was detected from Lumen’s Black Lotus Labs which is called as ReverseRat. Upon the analysis, it is confirmed that the…
Hunt the Haunt
As per the security researchers, a new remote access Trojan was detected from Lumen’s Black Lotus Labs which is called as ReverseRat. Upon the analysis, it is confirmed that the…
What are fileless malware attacks? In the real world, living off the land means surviving only with the available resources that you can get from nature. In the technology world,…
Cybersecurity researchers have discovered a new malware evasion technique called “Process Ghosting” with a new executable image tampering attack which could be potentially abused by the hackers in the windows…
As per the recent updates, the German government has decided to pass that allows German intelligence agencies to use Trojan software on its citizens without much noise in monitoring them…
Here is how Ransomware 2021 used legitimate tools to exploit the victims in ransomware campaigns. The tools were intended to be used for authorized and security researches but the ransomware…
Researchers from the Kaspersky Endpoint security firm have identified Zero-day exploit from Google’s Chrome browser and Microsoft windows zero-day exploits that have targeted multiple attacks on several enterprises. Now the…
Thanos Ransomware which targeted an attack on State-run organizations in the Middle East and North Africa on July 6 and July 9, 2020, seems to be active again as per…
On May 30th, 2021, Threat Intelligence company Cyble reported a new incident to the Bombay Stock Exchange (BSE), National Stock Exchange (NSE). A research team from Cyble performed an initial analysis…
The new Ransomware Epsilon Red was discovered Sophos malware researchers. This Ransomware is written in the Go programming language which is called Epsilon Red. The malware mainly targets the unpatched…
Ransomware is one of the dangerous threats in the digital security world in recent times. It is the most dangerous threat which is capable of encrypting the data and asking…