FonixCrypt Decryptor

FonixCrypter Ransomware active since 2020, the operators behind the threat shut down their operations and released the master decryption ke. The availability of the master decryption key allows the victims…
Nemty’s Ghost 👻 Technique

Nemty’s Ghost 👻 Technique

Ransomware operators are teaming up to exchange software and infrastructure to further accelerate the operation of leakage and extortion that harms the victims of such attacks. One such ransomware is…

Roche’s Pro Ocean 🌊 Malware

Pro Ocean known to be Cloud-targeted malware for carrying out crypto-jacking attacks for Monero used by Roche's group . The threat actors behind the attack have reportedly updated the malware…

Emotet 👹 Taken down

Emotet, one of the most active and dangerous botnets, has been taken down by international authorities. This email spamming botnet has been used to distribute malicious Word attachments that further…
Windows 7 Blind hijack

Windows 7 Blind hijack

Researchers warned window operating system users regarding the susceptibilities of Windows 7 to blind TCP/IP hijacking attacks. Adam Zabrocki reported the vulnerability to Microsoft reported eight years ago. Windows 7…

Cedar APT ! Volatile

Clearsky researchers linked the Lebanese Cedar group (aka Volatile Cedar) to a cyber espionage campaign that targeted companies around the world active since 2012 intruding in to telecoms and ISP…
Oscorp Android Malware

Oscorp Android Malware

A new family of Android malware dubbed Oscorp by CERT-AGID Italy, that abuses accessibility services in the device to hijack user credentials and record audio and video. The title of…