Tag: Cyber Security

  • Blog
  • Tag: Cyber Security
New StrelaStealer malware steals your Outlook, Thunderbird email accounts
New StrelaStealer malware steals your Outlook, Thunderbird email accounts
New StrelaStealer malware steals your Outlook, Thunderbird email accounts
New StrelaStealer malware steals your Outlook, Thunderbird email accounts

New StrelaStealer malware steals your Outlook, Thunderbird email accounts

A new information-stealing malware named ‘StrelaStealer’ is stealing email account credentials from Outlook and Thunderbird, two widely-used email clients. This behavior is unusual compared to info-stealers, which target various data sources, including browsers, cryptocurrency wallet apps, cloud gaming apps, the clipboard, and many others. Unknown malware developed by advisors at DCSO CyTec was discovered in

The new hacking group has added a customized version of the “Symatic Cobalt Strike” loader to their arsenal

A previously unknown APT (advanced persistent threat) group calling itself ‘Earth Longzhi’ targets organizations in East Asia, Southeast Asia, and Ukraine. The threat actors have been operational since at least 2020, using custom versions of Cobalt Strike loader plants to plant persistent backdoors on victim employees’ devices.   Earth Longzhi’s older campaign Trend Micro’s report

Cybersecurity Rules for Large-Scale Industries

As cybercrime poses a major threat for many larger companies today, it is a growing business practice. Reports show that cybercrime has been on the rise since the commencement of the Covid-19 pandemic. There is no single business unaffected by cyberattacks. However, large corporations are highly susceptible because they have complex organizational structures. Their vulnerability

A mass-YouTube campaign targeting over 100 services to launch Info Stealer

Researchers have discovered large-scale phishing campaigns on YouTube as tutorials for downloading and installing cracked software, freemium products. The bypass trick associated with the Information stealer video tutorial lures the viewers into believing the video is a scam for their desired software. We’ve seen very similar attempts in the past, downloading Pennywise and Redline stealer.