QBOT – A HTML Smuggling technique to target victims

QBot, also known as Qakbot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007….

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner….

A DEEP DIVE INTO NEW 64 BIT EMOTET MODULES

Emotet is usually delivered by SPAM campaigns containing document files. This self-propagating Trojan is a downloader malware that…

PowerShell: An Attacker’s Paradise

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

Introduction of DNS tunneling and how attackers use it.

  What is DNS?  DNS (Domain Name System) is a service that converts hostnames to IP addresses. It…

Worried about your mobile security? Here’s how to secure your device and enhance performance

While the world is still adapting to the new normal and mobile devices replace PCs as the primary…

Stay Alert of Facebook Credential Stealer Applications Stealing User’s Credentials.

Social media credentials are always a lucrative thing for threat actors. They use various techniques to get them….

Anydesk Software Exploited to Spread Babuk Ransomware

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office…

Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature

What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…

CetaRAT APT Group – Targeting the Government Agencies

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…