News

The U.S. State Department has announced a reward upto $10 million for information of Iranian hackers responsible for the IOControl malware.
The US government is again warning about potential Iranian cyberattacks as researchers find that hackers’ favorite ICS ...
Cybersecurity firm Claroty reported in December 2024 that the malware has been used to target everything from IP cameras and routers to PLCs, HMIs and firewalls, built by such vendors as Baicells, ...
Missile exchanges over the skies of Israel and Iran entered their eight day, wreaking death and destruction. Hacktivists are ...
Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iran’s nuclear sites.
"Cyber Av3ngers actors have utilized malware known as IOCONTROL to target ICS/SCADA devices used by critical infrastructure sectors in the United States and worldwide." Nobitex Hacked by Predatory ...
The IOCONTROL malware used in these campaigns targets water management systems, fuel, and connected objects. It allows total remote control. In October 2023, CyberAv3ngers claimed to have hacked 200 ...
Iran-affiliated threat actors have been linked to a new custom malware that's geared toward IoT and operational technology (OT) environments in Israel and the United States. The malware has been ...
A new version of the Android malware "Godfather" creates isolated virtual environments on mobile devices to steal account data and transactions from legitimate banking apps.
Crocodilus malware targets Android users through Facebook ads, stealing banking data and adding fake contacts to make scam calls appear legitimate in the U.S., Spain and Turkey.
This means the malware encrypts its code and data during periods of inactivity. In CoffeeLoader’s case, it only contacts its command-and-control server once every 30 minutes.