Tag Malware

StoneDrill Disk Wiping Malware Discovered Targeting European Industries

A newly identified disk-wiping malware known as StoneDrill has emerged, targeting a petroleum company in Europe. This malware bears similarities to the infamous Shamoon, which notoriously deleted data from 35,000 computers at Saudi Arabia’s national oil company back in 2012. Disk-wiping malware like StoneDrill can inflict severe damage on organizations…

Read MoreStoneDrill Disk Wiping Malware Discovered Targeting European Industries

Email Scam Broadly Targets GitHub Developers Using Dimnie Trojan

Open source developers utilizing GitHub have been alerted to a phishing email campaign aimed at infecting their systems with a sophisticated malware trojan known as Dimnie. This malicious software is designed to perform reconnaissance and espionage, enabling attackers to steal login credentials, download confidential files, capture screenshots, log keystrokes on…

Read MoreEmail Scam Broadly Targets GitHub Developers Using Dimnie Trojan

WikiLeaks Unveils ‘Marble’ Source Code Exploited by CIA to Implicate Russia and China

WikiLeaks Exposes CIA’s Marble Framework to Obscure Malware Origins In a groundbreaking revelation, WikiLeaks has unveiled hundreds of classified documents from its Vault 7 series, detailing the CIA’s capabilities for concealing its cyber operations. Among the newly released files is a component called “Marble,” which allegedly enables the agency to…

Read MoreWikiLeaks Unveils ‘Marble’ Source Code Exploited by CIA to Implicate Russia and China

Chinese Hackers Breach U.S. Trade Group Before Trump-Xi Trade Summit

Researchers have identified a Chinese cyber-espionage campaign targeting the United States ahead of the upcoming trade summit between President Donald Trump and President Xi Jinping. The findings, detailed in a report released by Fidelis Cybersecurity, reveal that the Chinese APT10 hacking group infiltrated the “Events” page of the U.S. National…

Read MoreChinese Hackers Breach U.S. Trade Group Before Trump-Xi Trade Summit

To Safeguard Your Devices, A Hacker Aims to Beat the Competition by Hacking You First

Recent reports highlight a controversial trend in cybersecurity involving a figure dubbed a ‘vigilante hacker.’ This individual is reportedly infiltrating IoT devices deemed vulnerable with the purported intent of securing them. However, unauthorized access to systems not owned by oneself is illegal, regardless of the motivation behind it. This phenomenon…

Read MoreTo Safeguard Your Devices, A Hacker Aims to Beat the Competition by Hacking You First

⚡ Weekly Highlights: Fortinet Vulnerabilities, RedLine Clipjack, NTLM Cracking, Copilot Attack & More

Emerging Cyber Threats: A Week in Review In the swiftly evolving landscape of cybersecurity, the distinctions between routine updates and significant breaches are increasingly blurred. Systems that once appeared secure are now subject to relentless challenges posed by new artificial intelligence tools, interconnected devices, and intricate automated systems. These innovations…

Read More⚡ Weekly Highlights: Fortinet Vulnerabilities, RedLine Clipjack, NTLM Cracking, Copilot Attack & More