Home 2017-08-28T17:57:09+05:30

BADBOX botnet hacked 74,000 Android devices with remote codes

BADBOX is a cybercriminal operation that infects Android devices, like TV boxes and smartphones, with malware before they are sold. These devices, often sold through trusted retailers, pose a major [...]

Malicious supply chain attacks shift from npm to VSCode Marketplace

Researchers have observed a rise in malicious activity on the VSCode Marketplace, exposing its vulnerability to supply chain attacks similar to those previously seen in the npm community. Malicious actors [...]

Careto: A Notorious Threat Group Targets Windows with Microphone Recording and File Theft

Recent research links The Mask group to a 2022 attack on a Latin American organization, exploiting an MDaemon email server and WorldClient webmail for persistent access. The initial compromise method [...]

New VIPKeyLogger in Office Docs Steals Credentials

VIPKeyLogger, similar to the Snake Keylogger, spreads through phishing campaigns via attachments disguised as archive or Microsoft 365 files. It uses malicious Office documents to connect to C2 servers and [...]

Hackers Exploit Windows Management Console for Backdoor Payloads

The FLUX#CONSOLE campaign exploits .MSC files to deploy backdoor malware, highlighting advanced phishing and Windows feature abuse. The FLUX#CONSOLE campaign is a multi-stage attack aimed at delivering backdoor malware. It [...]

Subscribe to our newsletter to receive security tips everday!