Category: Information Security

Xeno RAT

Open-Source Malware: The Xeno RAT Threat Exposed

A new advanced Remote Access Tool (RAT) named Xeno RAT has been published on GitHub. This Trojan, crafted in the C# programming language and compatible with Windows 10 and Windows 11 operating systems, offers...

SubdoMailing

“SubdoMailing”: Major Brands Hacked in Phishing Attack

In the expansive phishing operation dubbed “SubdoMailing,” uncovered by experts from Guardio Labs, over 8,000 subdomains of renowned brands and institutions were compromised by malefactors, including entities such as eBay, VMware, McAfee, The Economist,...

Banking Trojans Google Cloud Run

Banking Trojans Surge on Google Cloud Run

Analysts warn that hackers have increasingly exploited the Google Cloud Run service for the widespread distribution of banking trojans such as Astaroth, Mekotio, and Ousaban. Google Cloud Run enables users to deploy front-end and...

SSH-Snake

Warning: SSH-Snake’s Stealthy Network Invasion

Cybersecurity specialists at Sysdig have unveiled a new malicious entity dubbed SSH-Snake, designed to stealthily search for private keys and navigate through a victim’s infrastructure, rendering it significantly more perilous than conventional viruses that...

Migo malware

Linux Servers Targeted in Redis Cryptomining Campaign

Experts from Cado Security have uncovered a new malicious campaign targeting Redis servers. Once initial access to the systems is secured, the attackers mine cryptocurrency on the compromised Linux-operated hosts. According to Matt Muir,...

DLL Sideloading

Malicious PyPI Packages Bypass Security with DLL Sideloading

In a recent investigation conducted by security specialists from ReversingLabs, two malicious packages were identified within the Python Package Index (PyPI) repository, utilizing the DLL Sideloading technique to circumvent antivirus detection and execute malicious...

CVE-2024-21410

PSI Software SE Confirms Ransomware Disruption

PSI Software SE, a German developer of software for intricate manufacturing and logistics processes, confirmed it fell victim to a cyberattack involving ransomware, which compromised its internal infrastructure. Operating globally with a workforce exceeding...

Anatsa Trojan

Anatsa Trojan Evades Google Play, Targets New Countries

In November of last year, researchers discovered the expansion of malicious activity by an Android trojan named Anatsa into Slovakia, Slovenia, and the Czech Republic. This expansion is part of a new campaign which,...