Shade Ransomware Attack Enterprise Networks through Weaponized PDF Files & Malspam Emails

Shade Ransomware emerged in late 2014; it includes malicious spam

MuddyWater APT’s BlackWater Malware Campaign Install Backdoor on Victims PC to Gain Remote Access & Evade Detection

Researchers discovered a “Blackwater” malware campaign that suspected to associated

Hackers Launching Unique Windows and MacOS Malware via Fake WhatsApp Official Website

Researchers discovered a new malware that infect MacOS via malicious

Hacker Group Behind GozNym Banking Malware Dismantled by International Authorities that Stolen $100 Million

International law enforcement operation brings down a globally operated and

RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

A critical remote execution vulnerability in Microsoft remote desktop services

Hackers Distribute PLEAD Malware through Supply-chain and man-in-the-middle Attack

Security researchers a new malware campaign that delivers Plead malware

Flaw Affecting Millions of Cisco Devices Let Attackers Implant Persistent Backdoor

Researchers have discovered a severe vulnerability in Cisco products that

Microsoft Published a List of Legitimate Apps that Hackers Abuse to Bypass Windows Defender

Microsoft published legitimate apps that can be abused by attackers

Dharma Ransomware Abusing Legitimate Anti-virus Tool to Trick Victims And Infect Their Computers

A new variant of Dharma ransomware masquerading as an ESET

Turla APT Hackers Attack Microsoft Exchange Server using Powerful Malware to Spying on Emails

Turla cyberespionage groups developed an advanced piece of Malware named

Advanced Retefe Banking Malware Attack on Windows and Mac Users via Weaponized Word Documents

Researchers discovered a new wave of sophisticated banking malware called

Hackers Launching Qakbot Malware to Steal Login Credentials and Wipe the Bank Accounts

A new wave of Qakbot or Qbot banking malware campaign

Hackers Stolen Payment Data using Credit card Skimming Attack from 200 Universities Online Stores

Hackers injected malicious skimming scripts into online stores payment checkout

Hackers Use GitHub to Host Malware to Attack Victims by Abusing Yandex Owned Legitimate ad Service

Threat actors distribute malware by posting malicious ads that redirect

Hackers Exploiting Oracle WebLogic zero-day With New Ransomware To Encrypt User Data

Hackers exploiting the recently disclosed Oracle WebLogic Server remote code

Hackers Exploiting SS7 Protocol & Inject ATM Malware to Attack Banks and Financial Sectors

The Banking and Financial sectors were hit with a constant

Hackers Abusing Digitally Signed Emails to Launch JasperLoader Malware Via Weaponized Word Document

Security researchers tracked a new malware loader JasperLoader, which has

Emotet Malware’s New Evasion Technique Lets Hacked Device Used as Proxy command and control (C&C) servers

A new wave of Emotet malware using a special type