Botnet

10 Results / Page 1 of 2

Background

todayMarch 6, 2024

  • 100
close

News + Botnet + Incident Response Mjolnir Security

Cobalt Strike: Understanding the Tool That Has Become a Staple in the Cyber Attacker’s Arsenal

Introduction In the realm of cybersecurity, the name “Cobalt Strike” often surfaces in discussions about sophisticated cyber attacks. It is a tool that has gained notoriety for its use in high-profile breaches and has become a term intertwined with the activities of threat actors. This blog post delves into the ...

todayNovember 5, 2023

  • 190
close

Botnet + Breach + Cyber security + Cybercrime + News + Malware Mjolnir Security

Unraveling the Web of Sock5Systemz: Amadey and PrivateLoader Malware Revealed

In the realm of cyber threats, two names have emerged in recent times that have been causing a stir in the cybersecurity community: Amadey and PrivateLoader. Both are associated with a sophisticated malware called “Sock5Systemz”. In this post, we delve deep into the mechanics of these malwares, their Tactics, Techniques, ...

todayJuly 21, 2023

  • 121
  • 8
close

Malware + Botnet + Ransomware + SCADA + IoT + Global news + Crisis Management + Incident Response + Articles + Case Study Mjolnir Security

Unraveling the Veil of Cyber Attacks: How Mjolnir Security Safeguards the Digital Realm

Introduction: In today’s digital landscape characterized by an unprecedented degree of interconnectivity, global society is more susceptible to cyber threats than ever before. The escalating sophistication and frequency of cyber attacks necessitate a stronger emphasis on cybersecurity measures across organizations. Mjolnir Security emerges as a stalwart safeguard in this landscape, ...

Dark Web + Breach + Cybercrime + Incident Response + Articles + News + Malware + Botnet Mjolnir Security / April 14, 2023

Qakbot Takes Center Stage: A Deep Dive into the Latest Malware Threats and How Mjolnir Security Protects Your Business

Introduction For years, Mjolnir Security’s team of Intelligence analysts has diligently monitored malware and cyber threats impacting Canadian businesses and infrastructure. Recently, we’ve noticed a shift in the malware landscape, with Emotet and Trickbot taking a step back as Qakbot emerges as a dominant threat. In this blog post, we ...

News + Malware + Botnet + Ransomware Mjolnir Security / March 18, 2023

Emotet’s New Strategy: Exploiting Microsoft OneNote to Spread Malware and How Mjolnir Security Can Help

Introduction Emotet, a notorious banking Trojan, has been wreaking havoc in the cybersecurity world for years. With its sophisticated and ever-evolving techniques, this malware has become a significant threat to individuals and organizations alike. In this blog post, we’ll discuss how Emotet is now utilizing Microsoft OneNote to spread its ...

todayFebruary 3, 2021

  • 146
  • 1
Featuredstar
close

News + Malware + Botnet + Ransomware Mjolnir Security

Fall of Emotet

On January 27, 2021, news broke from Europol that a collaborative effort had effectively taken down and disrupted one of the most significant botnets in the past decade – Emotet. This global action and collaborative initiative incorporated authorities in the Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, ...

todayAugust 3, 2019

  • 82
close

Threat Intelligence + News + Malware + Botnet Mjolnir Security

Resurgence of Zeus

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on various versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. In a blog post ...

Mjolnir Security Torri Botnet IOC

todaySeptember 29, 2018

  • 182
  • 1
close

IoT + Business + News + Malware + Botnet + Exploits + Threat Intelligence Mjolnir Security

Torii Botnet

Security researchers at Avast have discovered a new malware strain that uses comes with a quite rich set of features for exfiltration of (sensitive) information, modular architecture capable of fetching and executing other commands and executables and all of it via multiple layers of encrypted communication named Torii. We have already ...