Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • June 5, 2025

    Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

    Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. “Catena uses embedded shellcode and configuration switching logic to…

    CyberCrime, cybercrime/malcode, CyberManiac, Cybersecurity, Cybersecurity awareness, Security Awareness, Threat Intelligence
  • June 5, 2025

    Hack Your Gut From the Mind: The Brain’s Surprising Control Over Your Microbiome

    New research shows your brain can reshape your gut bacteria in just 2 hours — here’s what it means for stress, immunity, mood, and biohacking Read more | > Go to Source

    bioengineering, biotech/medical, CyberCrime, cybercrime/malcode, CyberManiac, Cybersecurity, Cybersecurity awareness, neuroscience, Security Awareness, Threat Intelligence
  • June 5, 2025

    Reborn in Rust: AsyncRAT

          Go to Source

    CyberManiac, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Hunting, Threat Intelligence
  • June 5, 2025

    Printer company provided infected software downloads for half a year

          Go to Source

    CyberManiac, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Hunting, Threat Intelligence
  • June 5, 2025

    Sit, Fetch, Steal – Chihuahua Stealer: A new Breed of Infostealer

          Go to Source

    CyberManiac, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Hunting, Threat Intelligence
  • June 5, 2025

    100 Days of YARA: Writing Signatures for .NET Malware

    If YARA signatures for .NET assemblies only rely on strings, they are very limited. We explore more detection opportunities, including IL code, method signature definitions and specific custom attributes. Knowledge about the underlying .NET metadata structures, tokens and streams helps to craft more precise and efficient signatures, even in cases where relevant malware samples might…

    CyberManiac, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Hunting, Threat Intelligence
  • June 5, 2025

    Vidar Stealer: Revealing A New Deception Strategy

          Go to Source

    CyberManiac, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Hunting, Threat Intelligence
  • June 5, 2025

    Smoked out – Emmenhtal spreads SmokeLoader malware

          Go to Source

    CyberManiac, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Hunting, Threat Intelligence
  • June 5, 2025

    Unboxing Anubis: Exploring the Stealthy Tactics of FIN7’s Latest Backdoor

    In the ever-evolving landscape of advanced persistent threats (APTs), the notorious financial cybercrime group FIN7 has added another sophisticated tool to their arsenal. We have recently discovered a new Python-based backdoor, called “AnubisBackdoor”, being deployed in their latest campaigns.       Go to Source

    CyberManiac, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Hunting, Threat Intelligence
  • June 5, 2025

    Booking a Threat: Inside LummaStealer’s Fake reCAPTCHA

    Cybercriminals are taking advantage of the increased demand in travel by setting up fake booking sites, phishing scams and fraudulent listings to trick unsuspecting travelers.       Go to Source

    CyberManiac, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Hunting, Threat Intelligence
Previous Page
1 … 32 33 34 35 36 … 95
Next Page

Designed by Alireza Gharib