Pixelette Technologies

Solarmaker Info Stealer to Hit the Wild Again, What Makes it so Dangerous?
August 4, 2021

Solarmaker Info Stealer to Hit the Wild Again, What Makes it so Dangerous?

Solarmaker has found its way back into the wild In a second attack, a sophisticated known as Solarmaker is ready for the second go into the wild and will try to steal credentials once again.  What is Solarmaker Malware? As far back as April 2020, telemetry data suggests malicious actionsRead More
Cyber Attacks on Microsoft Through ASP.NET
August 4, 2021

Cyber Attacks on Microsoft Through ASP.NET

Microsoft Under Attack By A Hacking Group Among the targets of a new series of targeted cyber intrusion attacks in the U.S. by a hacking group are major high-profile public and private organizations that contain Internet Information Services servers (IIS) with a high degree of capability. “Praying Mantis” or “TG2021,”Read More
Ongoing Malicious Campaign that Uses Call Centers to Trick Users into Downloading Malware
August 4, 2021

Ongoing Malicious Campaign that Uses Call Centers to Trick Users into Downloading Malware

Fraudulent call center tricking the user into downloading Ransomware Hackers are now using the BazaCall- traditional social engineering techniques that rely on rogue URLs and malware-document. A method in which messages are sent to a targeted user claiming that your subscription will be expired unless calling a specific phone number.Read More
Go Programming Gains Popularity as GitHub Provides Security Features.
July 28, 2021

Go Programming Gains Popularity as GitHub Provides Security Features.

Go module’s popularity increasing largely. The Go programming module has been given an update by GitHub in the form of a new supply chain. This supply chain deals with the security updates for the module to make it better. On July 22 the product manager of GitHub; William Bartholomew issuedRead More
Pegasus Spyware to Target Journalists and Politicians Now
July 19, 2021

Pegasus Spyware to Target Journalists and Politicians Now

Heads of state, activists, and lawyers spied online A sweeping investigation of a data leak containing more than 50,000 phone numbers has exposed widespread abuse of “military-grade spyware” developed by the Israeli company NSO Group, which has been used to monitor journalists, activists, and lawyers around the world. This investigation,Read More
Cybercriminal Dr Hex arrested by Moroccon Interpol.
July 8, 2021

Cybercriminal Dr Hex arrested by Moroccon Interpol.

A cybersecurity firm published a report regarding Dr. HeX In a phishing and credit card, fraud scheme aimed at telecom and multinational corporations in France, law enforcement authorities has apprehended an alleged threat actor involved in targeting thousands of unwitting victims over several years. Interpol and other law enforcement agenciesRead More
The UK Helps Ireland To Protect It From Cyberthreats
July 6, 2021

The UK Helps Ireland To Protect It From Cyberthreats

Ireland’s telecom, energy & transport sectors under cyber threats The UK’s top cyber official has alarmed Irish telecom, energy, and transportation infrastructure of the growing cyber threats that continue to threaten them while acknowledging the UK’s ongoing close cooperation with Ireland. During a remote appearance at an Institute of InternationalRead More
Remote Code Execution Bug in All Microsoft Machines
July 6, 2021

Remote Code Execution Bug in All Microsoft Machines

Microsoft confirms that threat is present in all machines EHN previously reported that Microsoft had identified the latest bug of the Press Spooler Bugs in CVE-2021-34527, named “Print Nightmare,” which is lurking in all Microsoft variants. Tencent Security researchers had recently discovered the bug, which has been in the longRead More
IndigoZebra Hacking Campaign Targets Afghan Government
July 2, 2021

IndigoZebra Hacking Campaign Targets Afghan Government

APT hackers are attacking the Afghan government with malware A security researcher has warned of a possible espionage campaign directed against the government of Afghanistan, coordinated by a Chinese-speaking threat actor, which may be as old as 2014. Researchers at Check Point Research attribute the intrusions to an APT hackingRead More
Microsoft Opens Up on Signing a Driver that Was Malware
June 30, 2021

Microsoft Opens Up on Signing a Driver that Was Malware

Microsoft signed a threat actor unintentionally recently A malicious network filter rootkit named Netfilter was signed by Microsoft Admitted earlier this month, leading to the discovery of a driver called Netfilter is actually a threat actor. Immediately following his discovery of the rootkit, Kristen Hahn, a malware analyst with GRead More
Malware Abused 200k Windows for a Fraud of $2 Million
June 29, 2021

Malware Abused 200k Windows for a Fraud of $2 Million

Crackonosh is distributed using copies of a popular software warez On Thursday, the researchers at Avast published a report detailing the discovery of cryptocurrency mining malware targeting Windows Safe mode and generating over 9,000 Monero coins (evaluated at around $2 million today) through the compromise of more than 222,000 WindowsRead More
Critical Flaw In SonicWall VPN Appliances Detected
June 25, 2021

Critical Flaw In SonicWall VPN Appliances Detected

Memory leak vulnerability discovered in SonicWall VPN Despite having been patched last year, SonicWall VPN appliances have now been found to contain a critical vulnerability, resulting in an unrecognized memory leak flaw that could allow a remote attacker to access sensitive information. SonicOS patched this shortcoming on June 22. ItRead More
$1.8 Billion Loss of Businesses After BES Attacks
June 24, 2021

$1.8 Billion Loss of Businesses After BES Attacks

Businesses Lost $1.8 Billion Through BES Attacks in 2021 Attacks on businesses via business email compromise (BEC) increased dramatically in 2020, with over $1.8 billion being stolen in one year alone. Cybercriminals target companies by impersonating people inside the company or pretending to be partners or vendors in order toRead More
Middle Eastern APT Emerges from Hibernation
June 23, 2021

Middle Eastern APT Emerges from Hibernation

TA042 launches cyber attack on Middle Eastern Governments After laying low for two months, an advanced persistent-threat organization hailing from the Middle East has resumed its malicious operations and is now initiating cyber-attacks on the government bodies in the Middle East. Its targets are influential government institutions associated with theRead More
A Vulnerability in Android’s Anti-Virus Software
June 23, 2021

A Vulnerability in Android’s Anti-Virus Software

Android Devices susceptible to malware attacks A study conducted by a group of academics has concluded that anti-virus programs for Android remain susceptible to malware attacks, thus posing a serious risk to the security of Android users. As malicious actors continue to develop their toolkits, the vulnerability of android anti-virusRead More
North Korea Attacks Malware on South Korean Entities
June 17, 2021

North Korea Attacks Malware on South Korean Entities

Home network service and media sectors victim of malware attack The malware campaign that was detected earlier this year targeting South Korea has been attributed to Andariel, a nation-state hacking group out of North Korea. This again proves that Lazarus’ attackers are on top of the latest trends, and theyRead More
Newest Malware Technique Identifies as Process Ghosting
June 17, 2021

Newest Malware Technique Identifies as Process Ghosting

Process Ghosting surreptitiously hack a Windows system Security researchers have discovered a new attack known as “Process Ghosting” that uses malicious code to tamper with an executable image and enable an attacker to execute malicious code on a Windows system stealthfully. According to Elastic Security researcher Gabriel Landau, an attackerRead More
ThroughTek Flaw Used by Hackers Identified by Researchers
June 16, 2021

ThroughTek Flaw Used by Hackers Identified by Researchers

Widely used software ThoughTek identified with a vulnerability In an advisory published Tuesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) detailed a critical software supply-chain vulnerability affecting ThroughTek’s software development kit (SDK). An adversary could exploit this vulnerability to gain improper access to audio and video streams. CISA statedRead More
× How can we help you?