Malicious extension

Home/Malicious extension
27 12, 2023

Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware

By | 2024-01-05T10:52:27+05:30 December 27th, 2023|Compromised, Exploitation, malicious cyber actors, Malicious extension, Malware, Microsoft, Security Advisory, Security Update|

A recently identified phishing campaign is using decoy Microsoft Word documents as a lure to [...]

7 12, 2023

Microsoft Issues Warning on COLDRIVER: Ongoing Evolution in Evasion and Credential Theft Strategies

By | 2023-12-11T23:30:52+05:30 December 7th, 2023|Compromised, Darknet, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Microsoft, Security Advisory, Security Update|

COLDRIVER, the threat actor, persists in carrying out credential theft operations targeting entities strategically significant [...]

15 11, 2023

Google Warns of Malicious Exploitation of Bard by Fraudster

By | 2023-11-16T08:29:10+05:30 November 15th, 2023|BOTNET, Compromised, Evilproxy, Exploitation, google, Internet Security, IOC's, malicious cyber actors, Malicious extension, Security Advisory|

Google Files Lawsuit Against Fraudsters Exploiting Bard's Genetics Artificial Intelligence Hype to Deceptively Distribute Malware. [...]

13 11, 2023

BiBi-Windows Wiper: Targets Windows in Pro-Hamas attacks

By | 2023-11-14T08:08:12+05:30 November 13th, 2023|BOTNET, Compromised, cyberattack, Darknet, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, windows|

Cybersecurity researchers have issued a warning about a Windows variant of a malware called BiBi-Windows [...]

8 11, 2023

GootBot: New dangerous variant of GootLoader malware

By | 2023-11-15T07:26:37+05:30 November 8th, 2023|BOTNET, Compromised, cyberattack, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update|

The latest iteration of GootLoader malware, known as GootBot, enables lateral movement within compromised systems [...]

Subscribe to our newsletter to receive security tips everday!