Compromised

Home/Compromised
4 03, 2024

Beware: Business Email Compromise (BEC) Attacks Threaten Organizations

By | 2024-03-06T22:52:15+05:30 March 4th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Mobile Security, phishing, Security Advisory, Security Update, Spam, Tips|

The pandemic has spurred significant shifts in business models. With the rise of digital transformation, [...]

1 03, 2024

New Bifrost malware for Linux mimics VMware domain for evasion

By | 2024-03-26T06:22:10+05:30 March 1st, 2024|BOTNET, Compromised, Exploitation, Linux Malware, malicious cyber actors, Malware, Regulation, Security Advisory, Security Update, Tips, VMware|

A new Linux variant of Bifrost, called Bifrose, was detected employing a clever evasion tactic [...]

29 02, 2024

Hackers Exploit SVG Image Files for GUloader Malware Distribution

By | 2024-03-01T23:10:31+05:30 February 29th, 2024|Compromised, Darknet, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of [...]

29 02, 2024

Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes

By | 2024-03-01T23:10:53+05:30 February 29th, 2024|BOTNET, Compromised, Exploitation, hackers, Internet Security, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of [...]

28 02, 2024

Malicious npm Packages: North Korean Hackers Targeting Developers

By | 2024-03-11T05:34:07+05:30 February 28th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Mobile Security, Security Advisory, Security Update|

Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the [...]

Subscribe to our newsletter to receive security tips everday!