Cybersecurity News | QUICK READ
Cobalt Strike Is Being Installed by Emotet for Faster Attacks
This Comes Soon After Emotet Started to Test Installing Cobalt Strike Beacons on Infected Devices Instead of Their Regular Payloads.
Cybersecurity News | QUICK READ
Emotet Is Dropping Cobalt Strike
In this Way, the Malicious Actors Could Obtain Immediate Network Access.
Cybersecurity News | QUICK READ
Clop Ransomware Exploits SolarWinds Serv-U Flaw
The Clop Ransomware Gang Is Exploiting the Vulnerability in Attacks.
Cybersecurity News | QUICK READ
Harvester Malicious Group Is Going After Telcos
The State-Backed Hackers Use a Custom Malware.
Cybersecurity News | QUICK READ
A Version of Linux Cobalt Strike Beacon Is Being Used in Ongoing Attacks
This Is an Unofficial Version Created by Unknown Threat Actors from Scratch.
Cybersecurity News | QUICK READ
Newly Discovered Cobalt Strike Bugs Could Allow the Takedown of Attackers’ Servers
The Vulnerabilities Allow the Blocking of the Beacon Command-and-control (C2) Communication Channels and New Deployments.
Cybersecurity News | QUICK READ
Hancitor Is Using Well-Known Tricks to Spread Malware
Hancitor Has Been Using Cookies to Prevent URL Scraping.
Cybersecurity News | QUICK READ
BazarBackdoor Uses Nested RAR and ZIP Archives to Sneak in
The Nested Archive Method Became Popular as It Is Able to Trick Email Security Gateways Into Mislabeling Malicious Attachments as Clean.
Cybersecurity News | QUICK READ
A Fake Kaseya Security Update Is 'Backdooring' Networks Using Cobalt Strike
The Malicious Actors Are Pushing Cobalt Strike Payloads Disguised as Kaseya VSA Security Updates.
Cybersecurity News | QUICK READ
Cybercriminals Compromise Mongolian Certificate Authority MonPass to Distribute Malware
According to Researchers, the Hackers Backdoor Installers Dispensed Via the Company’s Website with Cobalt Strike Binaries.
Cybersecurity News | QUICK READ
BazaCall Malware Campaign: the New Path to Introducing Malware Came to Microsoft’s Attention
Microsoft Revealed that They Are Currently Following a BazaCall Malware Campaign. This Is a New Method by Which Hackers Make Way for Cyberattacks.
Cybersecurity News | QUICK READ
Colonial Pipeline Ransomware Lures Are Used in Phishing Attacks
The Ransomware Attack on Colonial Pipeline Helped a Threat Actor to Create a New Phishing Lure Able to Trick Victims Into Downloading Malicious Files.
Cybersecurity News | QUICK READ
Cobalt Strike - A Common Tool in the Arsenal of Cybercriminals
A Report Published by Intel 471 Analysts Shows How the Penetration Testing Tool Is Being Abused by Threat Actors.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats