PDF Documents Carrying Snake KeyLogger – Info Stealer
Microsoft Office Files are exploited for social engineering lures (especially Excel and Word), as these file formats are highly preferred by the public. The users are comfortable because the applications [...]
Lazarus targeting on VMware – Log4J Vulnerability Still Active
VMware servers are targeted again by the North Korean Hackers called Lazarus. The CVE-2021-44228 is exploited again to bring impact to a variety of products including the VMware Horizon Servers. [...]
Phishing attacks targeting Microsoft Windows Users with three Malwares
A sophisticated phishing campaign has started targeting Windows User. But, this campaign differs from other phishing attacks as it installs three malwares into the victim’s system. The phishing attack is [...]
Fake Mobile Apps to steal your Credentials and Private Keys
Recent observance by researchers in the Google Play Store showed that numbers of applications are malicious to the user. The malicious activities performed includes the stealing of credentials, private information [...]
Increasing Investors in NFT leads Hackers to Target NFT Sites
Due to the hiking interests towards the Pixelmon NFT Site, the threat actors have turned their attention towards them. Pixelmon is an Open World RPG NFT game. The player can [...]





Get Social