Babuk Locker Ransomware builder leaked online
Babuk Locker Ransomware builder has been leaked to the public on the internet, which will be more easily available for the threat actors of ransomware to modify and exploit a…
Netfilter malicious rootkits Signed by Microsoft
Recently malware analyst Karsten Hahn states that he has detected and analysed the file signed from Microsoft which is a rootkit called “Netfilter”. Netfilter is claimed to be official drivers from Microsoft…
Top Cybersecurity concerns by Security leaders of Organizations
Most of the top security leaders believe that their Organizations are more vulnerable to cybercrimes and all the time was right. As per the survey of the security leaders, the…
Microsoft suspects new breach from SolarWinds Hackers
Microsoft on Friday had confirmed that the Customer-services agents tools have been compromised by SolarWinds Hackers and used them to launch the attack on the customer using Microsoft own tools…
New Spyware PJobRAT targets Indian military personnel
According to recent study researchers from 360 Fiberhome labs discovered the attack that mainly targeting Indian Military personnel using new Android spyware called PJobRAT malware. The PJobRAT malware is spyware that is disguised as…
ReverseRat Trojan from Pakistan compromises Indian Power Company
As per the security researchers, a new remote access Trojan was detected from Lumen’s Black Lotus Labs which is called as ReverseRat. Upon the analysis, it is confirmed that the…
Fileless malware attacks detection and prevention
What are fileless malware attacks? In the real world, living off the land means surviving only with the available resources that you can get from nature. In the technology world,…
Process Ghosting – New Malware evasion attack technique
Cybersecurity researchers have discovered a new malware evasion technique called “Process Ghosting” with a new executable image tampering attack which could be potentially abused by the hackers in the windows…
What is Evasion Technique and its classification?
Introduction: Evasion technique is where the malwares can bypass the security control devices without even getting detected by them and executes the successful exploitation on the targeted victims. The term…
Samsung phones to spy on users
Security researchers analyzed the Samsung smartphones and found multiple critical vulnerabilities that can be exploited by the hackers using Pre-installed applications. As per the researchers, the vulnerabilities could exploit the…