Ryuk ransomware and Trickbot operators target U.S. hospitals and healthcare providers
According to U.S. government cybersecurity experts, Ryuk ransomware and Trickbot operators are targeting U.S. hospitals and healthcare providers.
According to U.S. government cybersecurity experts, Ryuk ransomware and Trickbot operators are targeting U.S. hospitals and healthcare providers.
A new IoT botnet dubbed Ttint now targets two Tenda router 0-day vulnerabilities to spread a Remote Access Trojan (RAT) based on Mirai botnet source code.
The Internet Crime Complaint Center (IC3) and Federal Bureau of Investigation (FBI) issued a new warning that cyber actors are using banking trojans and fake mobile banking apps to steal…
Security experts discovered LokiBot, a trojan malware, has been impersonating a popular game launcher. As a result, cybercriminals are able to trick users into downloading the fake app and executing the malware on their systems.
A multi-stage downloader trojan dubbed sLoad uses BITS to steal data from compromised systems. Attackers use sLoad to evade anti-malware protections and security monitoring that may not detect activity using these unconventional protocols.
A new Windows trojan dubbed CStealer attempts to steal passwords from Chrome browser. The malware also uses a remote MongoDB server to store the stolen passwords.
A new strain of malware called "HiddenWasp" targeting Linux-based systems has been discovered by researchers.
Cyber criminals have been actively pushing Emotet malware since early November.
A new malware family dubbed NOKKI is being used in politically motivated attacks targeting Russian and Cambodian speaking people and organizations.
US-CERT has published a joint Technical Alert (TA18-201A) warning of a cyber campaign involving Emotet Malware. Malicious activity was observed as recently as this month.