Tag: malware

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New SantaStealer malware

Cybersecurity Threat Advisory: New SantaStealer malware

A new malware-as-a-service (MaaS) info-stealer, SantaStealer, is actively promoted on Telegram and underground forums, with operators reportedly beginning its release ahead of year-end 2025. Read this Cybersecurity Threat Advisory to learn how to reduce your risk from this emerging threat....

/ December 24, 2025
Tech Time Warp
Tech Time Warp: Three scream-inducing examples of historical malware

Tech Time Warp: Three scream-inducing examples of historical malware

Malware is one of the managed service provider’s (MSP’s) worst professional nightmares, so it’s no wonder so many viruses have names that sound like horror movies. In honor of Halloween, let’s take a look at this rogue’s gallery of malware,...

/ October 31, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ChaosBot malware exploits Discord

Cybersecurity Threat Advisory: ChaosBot malware exploits Discord

A recently discovered Rust-based malware called ChaosBot is being used compromise computers via Discord channels. Review the details within this Cybersecurity Threat Advisory to learn more and see how to protect your system. What is the threat? ChaosBot is a...

/ October 16, 2025
Tech Time Warp
Tech Time Warp: 25 years of exploiting poor Pikachu

Tech Time Warp: 25 years of exploiting poor Pikachu

One of the first pieces of malware designed to target children turns 25 this month. Take a look back in this edition of Tech Time Warp. First detected in June 2000, the Pikachu Pokémon or “Pokey” virus played on a...

/ June 27, 2025
Tech Time Warp
Tech Time Warp: The 10-day takeover of a botnet

Tech Time Warp: The 10-day takeover of a botnet

In 2009, researchers from the University of California, Santa Barbara, outsmarted the cybercriminals behind the notorious Torpig botnet. They uncovered critical knowledge about how this type of malware works. Learn how in this edition of Tech Time Warp. Researchers first...

/ March 21, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation

Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation

A threat cluster dubbed “Green Nailao” is targeting European organizations, particularly in the healthcare sector, using Check Point Network Gateway Security vulnerability, CVE-2024-24919.  Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...

/ February 25, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: CoinLurker malware exploit

Cybersecurity Threat Advisory: CoinLurker malware exploit

Threat actors have begun using bogus software updates to deliver a new stealer malware known as “CoinLurker.” This malware uses cutting-edge obfuscation and anti-analysis techniques, making them frighteningly effective for threat actors. Continue reading this Cybersecurity Threat Advisory to learn...

/ December 19, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Socks5Systemz botnet compromise

Cybersecurity Threat Advisory: Socks5Systemz botnet compromise

The Socks5Systemz botnet has been revealed as the backbone for the illicit proxy service PROXY.AM, compromising over 85,000 devices globally. This botnet enables cybercriminals to conduct anonymous operations, including fraud, data theft, and distributed denial-of-service (DDoS) attacks. Continue to read...

/ December 11, 2024
Tech Time Warp
Tech Time Warp: Conficker’s persistent ability to outsmart defenses

Tech Time Warp: Conficker’s persistent ability to outsmart defenses

For the past 16 years, Conficker has been a virulent piece of malware. First identified in November 2008, it continues to persist in legacy operating systems (looking at you, Windows XP and Windows Server 2003). Take a look back in...

/ November 22, 2024
Mobile device threats: How serious are they?

Mobile device threats: How serious are they?

No matter how well a managed service provider (MSP) secures a client’s network, none of that matters if a hacker can gain access via a mobile device. According to statistics, mobile devices are an increasingly attractive target for hackers. Based...

/ July 18, 2024