#malwareUnmoderated tagAll PostsTrending TagsExplore CommunitiesCurators CommunityNewVisionLifeBlurtconnectNature LoversBlurt PakistanInformation WarBon VoyageTeam-MéxicoPhotography LoversBlurt ARTBlurtlatamblurt-171001#malwareTrendingHotNewMutedPayoutlavender-blue in # malware • 4 months ago • 1 min readBackdoor MalwareUnderstanding backdoor Malware. lavender-blue in # malware • 4 months ago • 1 min readComputer WormsMalware.imranahmed5298 in # cybersecurity • last year • 2 min readUnderstanding the Basics of CybersecurityUnderstanding the Basics of Cybersecurity Cybersecurity refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, and damage. With…blurtbot in # scam • 2 years ago • 1 min readPossible Phishing Scam … do not click on LinkThese comments look very suspicious. Please do not click on links. Possibly a scam to steal your keys.yehey in # cybersecurity • 2 years ago • 4 min readHow We Broke the Cloud With Two Lines of Code: The Full Story of ChaosdbHow We Broke the Cloud With Two Lines of Code: The Full Story of Chaosdb Wiz Research Team disclosed technical details about the discovery of the ChaosDB vulnerability in Azure Cosmos DB database…yehey in # cybersecurity • 2 years ago • 4 min readForrester Predicts Mass Cybersecurity Brain DrainRansomware: Police Sting Targets Suspects Behind 1,800 Attacks That ‘Wreaked Havoc Across the World’ Twelve people have been targeted by an international law enforcement operation for involvement…yehey in # ransomware • 2 years ago • 2 min readBlackMatter RansomwareThis joint Cybersecurity Advisory was developed by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) to…yehey in # malware • 3 years ago • 4 min readRomance Scammers Make $133m in First Half of 2021New Malware Uses Windows Subsystem for Linux for Stealthy Attacks Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that…yehey in # cybersecurity • 3 years ago • 2 min readBlackMatter ransomware hits medical technology giant OlympusCyber arms dealer exploits new iPhone software vulnerability A cyber surveillance company based in Israel developed a tool to break into Apple iPhones with a never-before-seen technique that has…yehey in # hacker • 3 years ago • 4 min read5 ways to better prepare your organization for a ransomware attackNorth Korean Hacker Recently Employed Social Media to Launch a Cyberattack North Korean hacking group Kumsong 121 has lately launched a series of cyberattacks that have taken advantage of social…yehey in # cybersecurity • 3 years ago • 3 min readJustice department battles to contain ransomware attackDiversify ‘homogenous’ US cybersecurity workforce A group of experts across multiple fields on Thursday recommended a sweeping set of actions to diversify the U.S. cybersecurity workforce, saying…yehey in # hacker • 3 years ago • 4 min readIt Takes Only One Human Error To Cause Your Next Data BreachHackers Steal U.N. Data That Could Be Used for Future Government Cyberattacks Hackers broke into the United Nation’s computer networks, making out with a cache of data that could be used to…yehey in # cybersecurity • 3 years ago • 4 min readUkrainian Hacker Extradited After Allegedly Sold Thousands of Passwords on the Dark WebCISA Warns of Actively Exploited Zoho ManageEngine ADSelfService Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday issued a bulletin warning of a zero-day…yehey in # cybersecurity • 3 years ago • 4 min readREvil Ransomware’s Servers Mysteriously Come Back OnlineHoward University announced Monday that they are investigating a ransomware attack and canceled classes Tuesday. Now, university officials are canceling online and hybrid classes Wednesday, too.…yehey in # cybersecurity • 3 years ago • 3 min readConti Ransomware Now Hacking Exchange Servers With Proxyshell ExploitsHackers and creeps extorted $8 million from Americans over the first seven months of the year by threatening to publish sexual images unless victims paid a fee, according to figures from the Federal…yehey in # cybersecurity • 3 years ago • 4 min read38 Million Records Exposed From Microsoft Power Apps of Dozens of OrganisationsOver the years, cyber-attacks and data breaches have become one of the biggest risks in the business sector, compromising sensitive data and causing a massive financial hit to companies and…yehey in # cybersecurity • 3 years ago • 3 min readOpen Source CyberSecurity News – Over a Third of Organizations Damaged by Ransomware or BreachMicrosoft Warns of a Evasive Year-long Spear-phishing Campaign Targeting Office 365 Users Microsoft warns of a long-running spear-phishing campaign that has targeted Office 365 customers in…yehey in # cybersecurity • 3 years ago • 3 min readOpen Source CyberSecurity News - Conti Ransomware Affiliate Goes Rogue, Leaks “Gang Data”Australian Govt Warns of Escalating LockBit Ransomware Attacks The Australian Cyber Security Centre (ACSC) warns of an increase of LockBit 2.0 ransomware attacks against Australian organizations…yehey in # cybersecurity • 3 years ago • 3 min readOpen Source CyberSecurity News - Newly Discovered Cobalt Strike Bugs Could Allow the Takedown of Attackers’ ServersBlack Hat 2021, “Hacking a Capsule Hotel – Ghost in the Bedrooms,” by Supa A series of vulnerabilities in internet of things (IoT) devices often found in connected hotel rooms allowed a researcher…fajar.purnama in # blurtech • 3 years ago • 5 min readMy Comments on Malware and Spams in Email when I was a young studentNote This is the ninth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment…