"Lapsus$" is a hacking gang that breaks into the accounts of high-profile executives and celebrities and then using their social media accounts to get mass media attention.
The Quantum Locker Ransomware gets into your computer by disguising itself as a legitimate update for Adobe Flash player. Once it is installed, it will encrypt all of your data and require you to pay ransom in Bitcoin. Your files will not be able to be accessed until this payment is made.
Emotet is an evil program that infects a computer and then uses it to send out spam or phishing emails to other people.
The purpose of cyberterrorism is to instill fear in a population by using computers and the internet to commit acts of violence.
Hive Ransomware uses an Advanced Encryption Standard (AES) algorithm, which is so strong that there are no decryption tools available at this time.
A new phishing technique has been discovered and that is a malicious browser extension that installs itself undetected in the background and injects pages with deceptive advertising and malware.
Black Cat Ransomware is a new ransomware that encrypts the contents of your hard drive and requests a ransom in Bitcoin
TrickBot is a dangerous malware that spreads to workstations and tries to steal data or command the computer. Trickbot was first seen in 2016 and has been used extensively by cybercriminals in many cases.
Ice phishing is a method that doesn't involve stealing private keys. Rather, it states convincing a user into signing a transaction that grants the attacker approval over the user's tokens.
Sugar Ransomware is powerful ransomware that works as-a-service (RaaS) malware threat. Unlike most major ransomware, Sugar appears to be focused on infecting individual users rather than corporate targets.
UpdateAgent malware tricks its victims into imitating legitimate software, such as support agents or video games, and spreads it through infected or malicious websites.
RINIK is an android malware that is a Trojan Virus as it pretends to be an Income tax refund application and instead steals the banking information of the user. DRINIK uses phishing techniques to attack user and persuade them to enter sensitive banking information.