Backdoor

Home/Malware/Backdoor
19 12, 2023

Kinsta Alerts About Phishing Campaign on Google Ads

By | 2023-12-21T07:07:39+05:30 December 19th, 2023|Backdoor, BOTNET, Compromised, cyberattack, Email servers, Evilproxy, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malware, Mobile Security, phishing, Security Advisory, Security Update, Spam|

Kinsta, a leading WordPress hosting provider, has alerted its customers to a troubling cybersecurity development. [...]

29 09, 2023

Zanubis: The Android banking trojan gets even more dangerous

By | 2023-10-03T05:32:51+05:30 September 29th, 2023|Android banking trojan, Backdoor, BOTNET, Compromised, Internet Security, Malware, Mobile Security, Security Advisory, Security Update|

The Android banking Trojan Zanubis has adopted a new disguise, posing as the official application [...]

25 09, 2023

Stealth Falcon hackers are using the new Deadglyph malware

By | 2023-09-27T08:12:06+05:30 September 25th, 2023|Backdoor, BOTNET, Compromised, Darknet, Evilproxy, Exploitation, hackers, infostealer, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

A recently discovered backdoor malware, known as "Deadglyph," has been detected in a cyberattack targeting [...]

20 09, 2023

Within the Code of a Fresh XWorm Variant

By | 2023-10-10T22:29:46+05:30 September 20th, 2023|Backdoor, BOTNET, Compromised, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware|

XWorm is a recent addition to the remote access trojan family, quickly establishing itself as [...]

17 08, 2023

Researchers Detect Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks

By | 2023-09-06T07:56:06+05:30 August 17th, 2023|Backdoor, BOTNET, Compromised, cyberattack, Darknet, Data Breach, Evilproxy, Exploitation, hackers, infostealer, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Software Issues, Tips|

Malicious actors could exploit existing vulnerabilities within the PowerShell Gallery to execute supply chain attacks [...]

Subscribe to our newsletter to receive security tips everday!