Skip to content
Securezoo Blog
  • Home
  • Threat Center Blog
    • Application Security
    • Cloud Security
    • Cryptography
    • Cybersecurity Articles
    • Cybersecurity Attacks
    • Identity & Access Management
    • Insider Threats
    • Internet of Things (IoT)
    • MalwareCyber security malware threats.
    • Network Security
    • Password Management
    • Regulations & Laws
    • Security Updates & Patches
    • Third-Party Security
    • Vulnerabilities & Exploits
    • Zero-days
  • Resources
  • Security Guidelines
    • CIS
    • PCI
    • NIST
    • Other
  • Services
    • Security Assessment
  • About Us
  • Contact Us
  • Privacy Policy
Menu Close
  • Home
  • Threat Center Blog
    • Application Security
    • Cloud Security
    • Cryptography
    • Cybersecurity Articles
    • Cybersecurity Attacks
    • Identity & Access Management
    • Insider Threats
    • Internet of Things (IoT)
    • Malware
    • Network Security
    • Password Management
    • Regulations & Laws
    • Security Updates & Patches
    • Third-Party Security
    • Vulnerabilities & Exploits
    • Zero-days
  • Resources
  • Security Guidelines
    • CIS
    • PCI
    • NIST
    • Other
  • Services
    • Security Assessment
  • About Us
  • Contact Us
  • Privacy Policy

Malware

  1. Home>
  2. Cybersecurity Threat Center>
  3. Malware>
  4. Page 2

WAPDropper mobile malware threat

  • Post author:Frank Crast
  • Post published:November 25, 2020
  • Post category:Cybersecurity Attacks/Malware/Mobile Security

Cyber security experts are warning users to beware of a WAPDropper, a new mobile malware threat that could sign you up for premium-rate phone services and could shock you the next time you get your bill.

Continue Reading WAPDropper mobile malware threat

New version of CRAT remote access trojan targets endpoints

  • Post author:Frank Crast
  • Post published:November 17, 2020
  • Post category:Cybersecurity Attacks/Malware/Vulnerabilities & Exploits

Security researchers from Cisco have discovered a new version of remote access trojan (RAT) dubbed "CRAT" that targets endpoints.

Continue Reading New version of CRAT remote access trojan targets endpoints

Russian threat actors use new ComRAT and Zebrocy malware in recent attacks

  • Post author:Frank Crast
  • Post published:November 2, 2020
  • Post category:Cybersecurity Attacks/Malware

U.S. government cybersecurity experts warned that "sophisticated threat actors" have been using new Russian malware variants, ComRAT and Zebrocy, in recent cyberattacks.

Continue Reading Russian threat actors use new ComRAT and Zebrocy malware in recent attacks

Ryuk ransomware and Trickbot operators target U.S. hospitals and healthcare providers

  • Post author:Frank Crast
  • Post published:October 29, 2020
  • Post category:Cybersecurity Attacks/Malware

According to U.S. government cybersecurity experts, Ryuk ransomware and Trickbot operators are targeting U.S. hospitals and healthcare providers.

Continue Reading Ryuk ransomware and Trickbot operators target U.S. hospitals and healthcare providers

Microsoft takes down TrickBot malware infrastructure

  • Post author:Frank Crast
  • Post published:October 12, 2020
  • Post category:Cybercrime/Cybersecurity Attacks/Malware

Microsoft has worked with telecommunications providers worldwide to take down TrickBot malware infrastructure. TrickBot traces its roots back to 2016 as a modular banking trojan designed to steal information and distribute other malware to infected systems.

Continue Reading Microsoft takes down TrickBot malware infrastructure

Ttint IoT botnet exploits 2 zero-days to spread RAT

  • Post author:Frank Crast
  • Post published:October 5, 2020
  • Post category:Cybersecurity Attacks/Internet of Things (IoT)/Malware/Network Security

A new IoT botnet dubbed Ttint now targets two Tenda router 0-day vulnerabilities to spread a Remote Access Trojan (RAT) based on Mirai botnet source code.

Continue Reading Ttint IoT botnet exploits 2 zero-days to spread RAT

SlothfulMedia: new malware variant used by “sophisticated actors”

  • Post author:Frank Crast
  • Post published:October 2, 2020
  • Post category:Malware

Security experts warned of a new malware variant dubbed SlothfulMedia has been used by a "sophisticated cyber actor."

Continue Reading SlothfulMedia: new malware variant used by “sophisticated actors”

GADOLINIUM threat actors use cloud services and open source tools in cyberattacks

  • Post author:Frank Crast
  • Post published:October 2, 2020
  • Post category:Cloud Security/Cybersecurity Articles/Cybersecurity Attacks/Malware

Security experts from Microsoft have observed a cyber threat actor dubbed GADOLINIUM that uses new attack techniques via cloud services and open source tools.

Continue Reading GADOLINIUM threat actors use cloud services and open source tools in cyberattacks

UHS hospitals hit by reported Ryuk ransomware cyberattack

  • Post author:Frank Crast
  • Post published:September 28, 2020
  • Post category:Cybersecurity Attacks/Malware

Universal Health Services (UHS) hospitals was allegedly hit by a Ryuk ransomware cyberattack early Sunday morning, some sources say.

Continue Reading UHS hospitals hit by reported Ryuk ransomware cyberattack

The top 3 endpoint threats used in 2020 cyberattacks

  • Post author:Frank Crast
  • Post published:September 22, 2020
  • Post category:Cybersecurity Articles/Cybersecurity Attacks/Endpoint Security/Malware/System Hardening/Vulnerabilities & Exploits

Cybersecurity criminals are continuing to change threat tactics by leveraging more fileless malware and duel-use tools to attack organizations.

Continue Reading The top 3 endpoint threats used in 2020 cyberattacks
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 21
  • Go to the next page

Categories

Archives

RSS Securezoo Cyber Security Threat Center – Latest Posts

  • FreakOut malware exploits new Linux vulnerabilities January 20, 2021
  • DNSpooq: Dnsmasq vulnerabilities open up network and Linux devices to attack January 19, 2021
  • NSA issues new guidance on encrypted DNS January 18, 2021
  • Authorities take down ‘world’s largest’ darknet marketplace January 18, 2021
  • FBI: Cyber criminals target employee credentials via voice phishing attacks January 18, 2021
  • Apache patches Tomcat vulnerability (CVE-2021-24122) January 15, 2021
  • Cisco patches High risk vulnerabilities in Small Business routers and other products January 15, 2021
  • Adobe releases security updates for Photoshop, Illustrator and other products January 14, 2021
  • Microsoft January 2021 Security Updates (to include zero-day RCE patch) January 13, 2021
  • High risk vulnerability in Zyxel firewalls and AP controllers exploited in the wild January 11, 2021
Copyright © 2021 Securezoo LLC. All rights reserved.