René Telemann

Tag Archives: Malware

Emotet Malware’s New Evasion Technique Lets Hacked Device Used as Proxy command and control (C&C) servers

A new wave of Emotet malware using a special type of evasion technique to fool the security software and hide the POST-infection traffic and evade the detection. Also it initially uses the hacked devices as proxy command and control (C&C) servers a…

Der Beitrag Emotet Malware’s New Evasion Technique Lets Hacked Device Used as Proxy command and control (C&C) servers erschien zuerst auf Computer Place.

Hackers Abuse Windows Installer MSI to Execute Malicious JavaScript, VBScript, PowerShell Scripts to Drop Malware

Hackers use malicious MSI files that download and execute malicious files that could bypass traditional security solutions. The dropped malware is capable of initiating a system shutdown or targeting financial systems located in certain locations. Secu…

Der Beitrag Hackers Abuse Windows Installer MSI to Execute Malicious JavaScript, VBScript, PowerShell Scripts to Drop Malware erschien zuerst auf Computer Place.

Hackers Behind DNSpionage Created a New Remote Admin Tool for C2 Server Communication Over HTTP and DNS

Threat actors behind the new malware campaign DNSpionage created a new remote administrative tool that supports HTTP and DNS communication with C&C Server that operates by attackers. Based on a recent incident, the DNSpionage campaign which is deve…

Der Beitrag Hackers Behind DNSpionage Created a New Remote Admin Tool for C2 Server Communication Over HTTP and DNS erschien zuerst auf Computer Place.

Hackers Hosting Malware On Google Sites To Steal Data and Share It to the Remote Server

Cybercriminals abusing Google sites via drive-by download attack to host dubbed “LoadPCBanker” banking malware to steal various sensitive data from compromised victims. Threat actors abusing Google sites file cabinets template and use it as a delivery …

Der Beitrag Hackers Hosting Malware On Google Sites To Steal Data and Share It to the Remote Server erschien zuerst auf Computer Place.

Hackers using weaponized TeamViewer to Attack & Gain Full Control of the Government Networks

Researchers spotted a new wave of cyber attack from Russian speaking hacker who uses the weaponized TeamViewer to compromise and gain the full control of the Government network systems. Teamviewer is the most popular tool used for remote Desktop contro…

Der Beitrag Hackers using weaponized TeamViewer to Attack & Gain Full Control of the Government Networks erschien zuerst auf Computer Place.

50 Malicious Android Apps Bypassed Google Play Protection and Infected 30 Million Android Users

More than 50 malicious apps with more than 30 Million installations found on Google play, that display annoying ads and in some cases, it convinces the user to install other apps. According to Avast, all the malicious apps are linked together using the…

Der Beitrag 50 Malicious Android Apps Bypassed Google Play Protection and Infected 30 Million Android Users erschien zuerst auf Computer Place.

Hackers Drop RevengeRAT Malware On Windows System Via Weaponized Word Document

New Malware attack campaign dubbed “Aggah” targeting various countries via weaponized Word documents and infect the victims by dropping the available RevengeRAT from Pastebin. Researchers from Palo Alto recently observed the largest malware…

Der Beitrag Hackers Drop RevengeRAT Malware On Windows System Via Weaponized Word Document erschien zuerst auf Computer Place.

ERMProtect Launches New Cybersecurity Education Games to Show How Employees Work Safely Online

ERMProtect Launches a new extensive list of animated chalkboard videos, digital games, cyber dictionaries, phishing tests and quizzes that allow employees to recognize the tactics followed by hackers. The educational games were launched to show the emp…

Der Beitrag ERMProtect Launches New Cybersecurity Education Games to Show How Employees Work Safely Online erschien zuerst auf Computer Place.

APT 34 Hackers Group Owned Hacking Tools, Web Shell, Malware Code, C2 Servers IP Leaked in Telegram

A group of hackers named “Lab Dookhtegan” leaked APT 34 Hacking Group owned powerful hacking tools, Malware source code and Web shell URL’s leaked via their Telegram channel which contains nearly 30 members. APT 34, a Well known hacki…

Der Beitrag APT 34 Hackers Group Owned Hacking Tools, Web Shell, Malware Code, C2 Servers IP Leaked in Telegram erschien zuerst auf Computer Place.

Durch die weitere Nutzung der Seite stimmst du der Verwendung von Cookies zu. Weitere Informationen

Die Cookie-Einstellungen auf dieser Website sind auf "Cookies zulassen" eingestellt, um das beste Surferlebnis zu ermöglichen. Wenn du diese Website ohne Änderung der Cookie-Einstellungen verwendest oder auf "Akzeptieren" klickst, erklärst du sich damit einverstanden.

Schließen