Etiket: Malware

02
Ağu
2023

Amazon’s AWS SSM agent can be used as post-exploitation RAT malware

Researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows hackers to use the platform’s System…

02
Ağu
2023

New Android Malware Via WhatsApp Steal Call logs

According to reports, a new Android malware is circulating under the guise of a fake chat application that is being…

02
Ağu
2023

New WikiLoader Malware Deliver Through Weaponized Files

The Italian organizations, including tax agencies, were targeted by a new malware downloader delivering banking Trojan. The new loader malware…

01
Ağu
2023

Hackers use new malware to breach air-gapped devices in Eastern Europe

Chinese state-sponsored hackers have been targeting industrial organizations with new malware that can steal data from air-gapped systems. Air-gapped systems…

01
Ağu
2023

‘DarkBERT’ GPT-Based Malware Trains Up on the Entire Dark Web

The developer behind the FraudGPT malicious chatbot is readying even more sophisticated adversarial tools based on generative AI and Google’s…

01
Ağu
2023

Chinese APT Group Hits Air-Gapped Systems in Europe with Malware

IN SUMMARY Cybersecurity researchers at Kaspersky Labs identified the malware. The malware used by APT31 targets European industrial control systems….

01
Ağu
2023

Apple Users Open to Remote Control via Tricky macOS Malware

Recently discovered data-stealing malware is targeting macOS users with a sneaky approach that uses Hidden Virtual Network Computing (hVNC). It’s…

01
Ağu
2023

Cybercriminals train AI chatbots for phishing, malware attacks

In the wake of WormGPT, a ChatGPT clone trained on malware-focused data, a new generative artificial intelligence hacking tool called…

01
Ağu
2023

WikiLoader Malware Target Italian Firms: Proofpoint Report

Researchers found a new malicious software, named WikiLoader malware. It was named so because it made a request to Wikipedia…

31
Tem
2023

New Malware WikiLoader Targeting Italian Organizations

Cybercrime , Fraud Management & Cybercrime Campaign Uses Malicious Microsoft Office Attachments Prajeet Nair (@prajeetspeaks) • July 31, 2023  …

31
Tem
2023

Air-Gapped ICS Systems Targeted by Sophisticated Malware

Security teams in industrial control systems (ICS) environments are fighting a worm that gets past air-gapped defenses. Researchers from Kaspersky ICS-CERT…

31
Tem
2023

New Android Malware Uses Optical Character Recognition

A new Android malware strain uses OCR (Optical Character Recognition) techniques to extract sensitive data from pictures. This new Android…