FIN7, a dangerous group of hackers
This group of hackers called Fin7 has been around for a long time, as it is believed to be behind…
FiveHands is the new Ransomware Variant
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations to beware of a relatively new ransomware variant called…
HTTP Flood DDoS attack method
HTTP flooding is a type of DDoS attack. In these cases, the attacker’s goal is to saturate the application or…
Telnet Protocol – A dedicated management tool
The Telnet protocol is applied over a TCP connection to send data in 8-bit encoded ASCII format, including Telnet verification…
Lorenz is the new Ransomware targeting businesses
A new ransomware operation known as Lorenz targets organizations around the world with tailored attacks demanding hundreds of thousands of…
FTP Protocol, Be very careful of its risks
Although the HTTP protocol is increasingly used for file transfer, the old FTP protocol (File Transfer Protocol) is still present…
Stellar and Lumens currency trading tool
The Stellar platform is primarily a tool for making normal currency transfers, but it also has its own cryptocurrency, Lumens.…
Snip3 tool that enchances the dangerous RAT threat
As we saw recently, RAT is a type of malware very similar to legitimate remote access programs. The main difference,…
TeaBot – A dangerous malware targeting banks
Cleafy, a company specialized in cyber security, announced that it has discovered a new malicious program or malware called TeaBot,…
Hancitor is a Trojan that has evolved
Hancitor is an information thief and malware downloader used by a designated threat actor like MAN1, Moskalvzapoe or TA511 also…

