Skip to content
career
WebOrion™ Cyber Security and Vulnerability Assessment Services
  • Company
  • Services
    • Web Security
    • Mobile Security
    • Cloud Security
    • API Security
    • Bug Bounty
  • News & Updates
Contact Us
Contact Us
Free Website Scanner
WebOrion™ Cyber Security and Vulnerability Assessment Services
  • Services

Cryptomining Malware

Leave a Comment / MalWare, Cyber Security / Weborion

Cryptomining malware, or cryptocurrency mining malware or simply cryptojacking, is a relatively new term that refers to software programs and malware components developed to take over a computer’s resources and use them for cryptocurrency mining without a user’s explicit permission.

Cryptomining Malware Read More »

InnfiRAT

Leave a Comment / Cyber Attack, Cyber Security, MalWare / Weborion

A remote access Trojan (RAT) dubbed InnfiRAT comes with extensive capabilities to steal sensitive information, including cryptocurrency wallet data. Zscaler’s ThreatLabZ team took a closer look at its inner workings, although the malware has been in the wild for a while.

InnfiRAT Read More »

Glupteba Malware

Leave a Comment / Cyber Attack, Cyber Security, MalWare / Weborion

Glupteba is a Trojan horse that downloads and executes potentially malicious files on the compromised computer. Several variants of Trojan Glupteba with updated functionalities are reported. This Trojan arrives on a system as a file dropped by other malware or by exploit kits when users are being unknowingly routed to malicious sites. Generally, the malware

Glupteba Malware Read More »

CryptoSink Malware

Leave a Comment / Cyber Attack, MalWare / Weborion

The threat intelligence arm of F5 Networks have uncovered a new malware campaign dubbed “CryptoSink” used to deploy an XRM (Monero) mining operation targeting Elasticsearch systems.   

CryptoSink Malware Read More »

Astaroth Trojan

Leave a Comment / Cyber Attack, Cyber Security, MalWare / Weborion

Astaroth is a high-risk trojan-type virus. It is typically distributed using spam email campaigns. Criminals send hundreds of thousands of emails that contain deceptive messages encouraging users to open attached files (Microsoft Office documents).

Astaroth Trojan Read More »

Post pagination
← Previous 1 … 33 34 35 … 83 Next →

Cybersecurity

Helping Clients Stay Secure By Ethically Hacking Them Well Before Malicious Hackers Do.

Services

  • Cloud Security
  • Web App Pentest
  • Mobile App Pentest
  • API Pentest
  • Bug Bounty

Quick Links

  • Services
  • Defensive
  • News & Updates
  • career
  • Contact

Contact Info

325, Sun Gravitas Nr, Shyamal Cross Rd, Rajmani Society, Shyamal, Ahmedabad, Gujarat 380015

© 2026 Weborion Innovation Pvt Ltd

Digital Marketing Partner Real Rank Riser