Newest Symbiote Malware Affects All Running Processes on Linux Systems
A newly discovered Linux malware known as Symbiote infects all running processes on compromised systems, steals account credentials, and gives its operators backdoor access. The main objective of this malware [...]
10 ways attackers gain access to networks
A joint multi-national cybersecurity advisory has revealed the top ten attackers vectors most exploited by cybercriminals in order to gain access to organisation networks, as well as the techniques they use to [...]
Cuba ransomware returns to extorting victims with updated encryptor
A new binary sampled by Trend Micro included minor additions and changes that make the malware more dangerous. More importantly, though, it shows that the operation is still alive and [...]
This WhatsApp Call Forwarding Trick Allows Hackers To Hijack Your Account
As we all know each WhatsApp account is tied to a phone number, and hackers are calling these phone numbers directly and employing social engineering techniques to trick victims into [...]
Qbot malware now uses windows MSDT Zer0-Day in phishing attacks
In phishing assaults, the Qbot malware now uses the Windows MSDT zero-day. A serious Windows zero-day vulnerability known as Follina is currently being actively exploited in continuing phishing campaigns to [...]
Get Social