Between February and March 2022, a variant of the Mirai botnet known as Beastmode was using newly reported vulnerabilities in TOTOLINK routers to infect unpatched devices and potentially expand its…
malware
-
-
-
Threat actors are actively exploiting new vulnerabilities of Microsoft, Oracle, Apache, and Apple, according to the US Cybersecurity and Infrastructure Security Agency (CISA). Based on information that threat actors are…
-
Cybersecurity researchers from HP identified a fake Windows 11 installer app online that contains a hidden RedLine Stealer malware. For those unfamiliar, RedLine Stealer is a powerful malware capable of…
-
Researchers discovered that hackers are using the news of the latest Omicron strain to distribute a powerful malware that steals information and passwords from Windows users in at least 12…
-
More than two-thirds of malware downloads came from cloud apps in 2021 and identified Google Drive as the app with the most malware downloads, taking the spot from Microsoft OneDrive,…
-
According to researchers, installers of the Telegram app are used to distribute malicious backdoor on compromised systems. Read on to know more… Cybersecurity researchers have cautioned that fake Telegram Messenger…
-
