Tag: Malware

Cybercriminals Target Middle Eastern Users with Malicious Palo Alto Software

Rising Threats: Malware Disguised as Palo Alto GlobalProtect Targets Middle East Users In an alarming trend, threat actors are increasingly targeting users in the Middle...

Chinese Velvet Ant Exploits Cisco Zero-Day to Deploy Tailored Malware

Velvet Ant: The Chinese Cyber Espionage Group Leveraging Zero-Day Exploits In the ever-evolving landscape of cybersecurity threats, the emergence of advanced persistent threat (APT) groups...

New Android Malware NGate Hijacks NFC Data to Duplicate Contactless Payment Cards

Unveiling NGate: The New Android Malware Threatening Contactless Payments In an alarming revelation, cybersecurity researchers have identified a new strain of Android malware known as...

Infostealers Dance Across macOS to Capture Crypto Wallets and Browser Credentials

The Rise of Cthulhu Stealer: A New Threat in macOS Environments In the ever-evolving landscape of cybersecurity, new threats emerge regularly, often capitalizing on existing...

Hackers Strike Middle Eastern Governments with Stealthy “CR4T” Backdoor Attack

Unveiling DuneQuixote: A New Era of Cyber Espionage in the Middle East In an alarming development in the realm of cyber espionage, a previously undocumented...

Iranian Cyber Threat Group Unveils New Backdoor Tool, ‘BugSleep’

The Evolution of MuddyWater: Iranian Cyber-Espionage Group Shifts Tactics In the ever-evolving landscape of cyber warfare, the Iranian cyber-espionage group known as MuddyWater has recently...

Turla Group Implements LunarWeb and LunarMail Backdoors in Diplomatic Operations

Unveiling the Lunar Backdoors: A New Threat to Diplomatic Security In an alarming development for cybersecurity, an unnamed European Ministry of Foreign Affairs (MFA) and...

Keylogger Integrated into Microsoft Exchange Server Captures Login Credentials

Major Security Breach: Keylogger Discovered in Microsoft Exchange Server In a startling revelation, Positive Technologies’ Expert Security Centre (PT ESC) has uncovered a sophisticated keylogger...

Exploitation of MS Exchange Server Vulnerabilities to Deploy Keyloggers in Targeted Attacks

Unmasking the Threat: Keylogger Malware Exploiting Microsoft Exchange Server Vulnerabilities On May 22, 2024, the cybersecurity landscape was shaken by revelations from Positive Technologies, a...

Chinese Hackers Utilize SpiceRAT and SugarGh0st in Worldwide Espionage Operation

Unveiling SneakyChef: The New Threat in Cyber Espionage In the ever-evolving landscape of cybersecurity, new threats emerge regularly, each more sophisticated than the last. One...

GuardZoo Malware Affects More Than 450 Military Personnel in the Middle East

GuardZoo: The Rising Threat of Android Surveillanceware Targeting Military Personnel In an age where digital security is paramount, the emergence of sophisticated surveillanceware poses a...

Iranian Hackers Unleash New BugSleep Backdoor in Cyber Attacks Across the Middle East

The Evolving Threat Landscape: MuddyWater's New Backdoor Campaign In the ever-changing world of cybersecurity, threat actors continuously adapt their tactics to evade detection and maintain...

Recent articles

spot_img