Home 2017-08-28T17:57:09+05:30

Windows malware uses PowerShell to inject malicious extension into Chrome

The malware is designed to install malicious extension(s) onto browsers. Currently, two distinct variants of ChromeLoader have been detected - one targeting Windows Operating Systems and another - Mac Operating [...]

Austria hit by BlackCat Ransomware, which demands $5 Million

The Austrian Federal State, Carinthia was attacked on Tuesday and Government services were severely disrupted as more workstations were apparently locked by the attacker. BlackCat, also called as ALPHV, a [...]

Critical Vulnerabilities Identified in OAS Platform

Open Automation Software (OAS) has been identified with vulnerabilities by researchers. These vulnerabilities are getting exploited by the threat actors. OAS is a platform that allows data connection between Industrial [...]

Automobile Manufacturer – General Motors under Credential Stuffing Attack

The General Motors had released a report last week about a data breach in the company that occurred between 11th - 29th of April month. However, the cause of this [...]

Further Analysis into BPFDoor reveals about Vulnerability Exploitation

BPFDoor is a traditional backdoor that had been exploited against the Government, telecommunication, Education and Logistics organizations for at least a several years. This was possible because it has been [...]

By | May 26th, 2022|Data Breach, Exploitation, IOC's, Malware, Targeted Attacks|0 Comments

Subscribe to our newsletter to receive security tips everday!