The Infamous Hacker Group Maze Claims They Are Shutting Down Its Ransomware Operations
The Maze hacking gang that began operating in May of 2019 is thought to be shutting down its operations. The…
Buer Loader Grows in Popularity for Malware-as-a-Service Attackers
Most followers of malware news have certainly heard of Emotet. Emotet is part of an extensive family of malware known…
With the Rise of Cyberattacks & Disinformation Campaigns, Fear Continues to Mount Over Malware Disrupting the US
With the US election is upon us, cybersecurity researchers find themselves less concerned with potential winners and losers of the…
RFQ Doc List Email Scam: Unmasking the Phishing Threat and How to Stay Protected
In today's digital landscape, cyber threats come in various forms, and email scams remain a prominent vehicle for cybercriminals. One…
Everywhere Weather Browser Hijacker: Unveiling the Threat, Removal Guide, and Prevention Tips
In today's digital age, where we rely on web browsers for numerous tasks, online security is paramount. However, lurking in…
Google Safe Browser Total Protection Scam: Unmasking the Deceptive Threat and Safeguarding Your Online Security
In the ever-evolving landscape of cyber threats, deceptive schemes have become increasingly sophisticated, targeting unsuspecting users with the allure of…
ITHH Ransomware: A New Variant of the Infamous STOP/Djvu Ransomware
What is STOP/Djvu Ransomware? Ransomware is a malicious form of malware that encrypts a victim's files or locks them out…
ITRZ Ransomware: How to Protect Yourself from the STOP/Djvu Ransomware Variant
ITRZ Ransomware is yet another malware strain that is a part of the prolific STOP/Djvu Ransomware family. Like other similar…
Ghimob Malware Can Spy & Steal Users’ Bank Details from Hundreds of Android Mobile Apps
Brazil-based hackers have recently expanded their operations worldwide with a new banking Trojan targeting Android users in multiple Latin American…
macOS Bundlore Loader Avoids Detection by Hiding its Payload Within a Named Fork
2020 has been a landmark year for new developments in macOS threat actor tactics. These include shifts to shell scripts,…