Skip to content

MΔlware Junction

Cyber Security Blogs

  • Home
  • Data Breaches
  • Vulnerabilities
  • Malware Families
  • IoC
  • Tutorials
    • Malware Analysis
    • Reverse Engineering
  • About Us

Tag: Cyber Security

What Are Rootkits? Types, Threats & Protection
Tutorials

What Are Rootkits? Types, Threats & Protection

AdminApril 10, 2025April 10, 2025

What are Rootkits? A rootkit is a kind of malware program that allows cyber attackers to increase access and penetrate…

New Malware Alert: TCESB Actively Exploiting ESET Security Scanner
Malware Families

New Malware Alert: TCESB Actively Exploiting ESET Security Scanner

AdminApril 9, 2025April 9, 2025

In 2024, cybersecurity experts at Kaspersky discovered a new cyber hacking tool that is used by a group, called ToddyCat.…

A Deep Dive into Ransomware: Understanding Its Types and the Most Famous Attacks
Tutorials

A Deep Dive into Ransomware: Understanding Its Types and the Most Famous Attacks

AdminApril 9, 2025April 9, 2025

What is Ransomware? Ransomware is a kind of malware that is developed to block access to the computer system and…

Malware Explained: What It Is, How It Spreads, and the Different Types
Tutorials

Malware Explained: What It Is, How It Spreads, and the Different Types

AdminApril 8, 2025April 8, 2025

What is Malware? Malware is short for malicious application or code that intentionally harms or exploits any programmable device, network,…

Continuing Social Engineering Campaign Associated with Black Basta Ransomware Operators
Malware FamiliesVulnerabilities

Continuing Social Engineering Campaign Associated with Black Basta Ransomware Operators

AdminMay 15, 2024May 15, 2024

Security analysts have discovered an active social engineering campaign targeting enterprises, utilizing spam emails to gain initial access to their…

MITRE Introduces EMB3D: A Threat Modeling Framework Designed for Embedded Devices
Tutorials

MITRE Introduces EMB3D: A Threat Modeling Framework Designed for Embedded Devices

AdminMay 14, 2024May 14, 2024

The MITRE Corporation has recently released a new threat-modeling framework, known as EMB3D, tailored for manufacturers of embedded devices utilized…

CVE-2024-31210: WordPress Plugin Upload Vulnerability Exploiting Remote Code Execution
Vulnerabilities

CVE-2024-31210: WordPress Plugin Upload Vulnerability Exploiting Remote Code Execution

AdminApril 16, 2024May 14, 2024

Summary Administrative users on single-site setups and Super Admin-level users on Multisite setups could capitalize on a loophole in the…

LightSpy is back: Fresh Espionage Initiative Focuses on Southern Asia, Potentially Targeting India
Malware Families

LightSpy is back: Fresh Espionage Initiative Focuses on Southern Asia, Potentially Targeting India

AdminApril 15, 2024

LightSpy, an advanced iOS implant, surfaced in 2020 via a watering-hole attack targeting Apple users. It’s a modular surveillance tool,…

Giant Tiger data breach, leaking 2.8 million records online.
Data Breaches

Giant Tiger data breach, leaking 2.8 million records online.

AdminApril 13, 2024May 14, 2024

In March 2024, Giant Tiger, a prominent Canadian retail chain, disclosed a significant data breach. Following this disclosure, a hacker…

Zero-Day Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)
Vulnerabilities

Zero-Day Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)

AdminApril 13, 2024April 15, 2024

On April 10, 2024, Volexity uncovered the zero-day exploitation of a vulnerability in Palo Alto Networks PAN-OS GlobalProtect feature at…

Follow Us:

  • LinkedIn
  • Telegram
  • X

Recent Posts

  • What Are Rootkits? Types, Threats & Protection
  • New Malware Alert: TCESB Actively Exploiting ESET Security Scanner
  • A Deep Dive into Ransomware: Understanding Its Types and the Most Famous Attacks
  • Malware Explained: What It Is, How It Spreads, and the Different Types
  • BlankBot: A newly identified Android banking Trojan equipped with advanced features such as screen recording, keylogging, and remote control capabilities.

Recent Comments

  1. BUY ONLYFANS MEGA LINKS on BlankBot: A newly identified Android banking Trojan equipped with advanced features such as screen recording, keylogging, and remote control capabilities.
  2. 10TB ONLYFANS MEGA FOLDER on BlankBot: A newly identified Android banking Trojan equipped with advanced features such as screen recording, keylogging, and remote control capabilities.
  3. 11TB ONLY FANS MEGA LINK on BlankBot: A newly identified Android banking Trojan equipped with advanced features such as screen recording, keylogging, and remote control capabilities.
  4. ONLY FANS LEAKS TRADING on BlankBot: A newly identified Android banking Trojan equipped with advanced features such as screen recording, keylogging, and remote control capabilities.
  5. PURCHASE ONLY FANS LEAKS on BlankBot: A newly identified Android banking Trojan equipped with advanced features such as screen recording, keylogging, and remote control capabilities.

Archives

  • April 2025
  • August 2024
  • May 2024
  • April 2024

Categories

  • Attack
  • Data Breaches
  • Malware Families
  • Tutorials
  • Vulnerabilities

    Copyright © 2025 MΔlware Junction | Quick News by Ascendoor | Powered by WordPress.