Source Link A Turkish-speaking entity called Nitrokod has been attributed to an active cryptocurrency…
Malware
- 
	
 - 
	
Source Link Nation-state threat actors are increasingly adopting and integrating the Sliver command-and-control (C2)…
 - 
	Malware
SolarWinds Hackers Using New Post-Exploitation Backdoor ‘MagicWeb’
by Deeba Ahmedby Deeba AhmedSource Link Russian cyberespionage group APT29, responsible for the devastating SolarWinds supply chain attacks…
 - 
	
Source Link What is WannaCry? WannaCry is a ransomware worm that spread rapidly through…
 - 
	
Source Link Threat actors have begun to use the Tox peer-to-peer instant messaging service…
 - 
	
Source Link WordPress sites are being hacked to display fraudulent Cloudflare DDoS protection pages…
 - 
	
Source Link A new strain of ransomware has been making victims for the past…
 - 
	
Source Link The operators of the XCSSET macOS malware have upped the stakes by…
 - 
	Malware
Backdoored Counterfeited Android Phones Hacking WhatsApp Accounts
by Deeba Ahmedby Deeba AhmedSource Link The IT security researchers at Doctor Web have identified that many budget…
 - 
	
Source Link Atlanta-based cyber risk intelligence company, Cyble discovered a new Remote Access Trojan…
 
