AZORult (Infostealer) – Malware
Azorult malware operates as an information-stealing threat, collecting data such as browsing history, cookies, login credentials, and cryptocurrency details.
Azorult malware operates as an information-stealing threat, collecting data such as browsing history, cookies, login credentials, and cryptocurrency details.
A recent phishing campaign has been detected distributing remote access trojans (RATs), including VCURMS and STRRAT, through a malicious Java-based downloader.
A financially driven threat actor, identified as Magnet Goblin, is incorporating one-day security vulnerabilities into its arsenal to breach edge devices.
Zscaler’s ThreatLabz uncovered a disturbing trend: a threat actor deploying fake Skype, Google Meet, and Zoom websites to disseminate malware.
Bitfrost collects the victim's hostname, IP address, and process IDs, then uses RC4 encryption to secure it before transmission to the C2.
The emergence of a new variant of the Bifrost remote access trojan targeting Linux systems has been identified by researchers from Palo Alto Networks' Unit 42.
As travelers gear up for a new season of adventures, cyber attackers are shifting their focus to exploit this trend by distributing the Agent Tesla malware.
FritzFrog, a notorious peer-to-peer botnet, has reappeared with an advanced variant leveraging the Log4Shell vulnerability for internal network propagation.
An ongoing campaign of malicious ads is actively targeting Chinese-speaking users, luring them with promises of popular messaging applications like Telegram
Hackers are leveraging the ubiquity of office documents in business communications to disseminate malicious malware easily.