Malware

Sandworm hackers incapacitated Ukrainian power grid amid missile strike

Sandworm hackers incapacitated Ukrainian power grid amid missile strike 09/11/2023 at 19:17 By Helga Labus Russia-backed ATP group Sandworm is behind the cyberattack that caused disruption of parts of the Ukrainian power grid in late 2022, according to Mandiant. About Sandworm “Sandworm is a threat actor that has carried out cyber operations in support of […]

React to this headline:

Loading spinner

Sandworm hackers incapacitated Ukrainian power grid amid missile strike Read More »

‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools

‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools 09/11/2023 at 17:46 By Ionut Arghire Checkmarx uncovers a malicious campaign targeting Python developers with malware that takes over their systems. The post ‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools Read More »

New MacOS Malware Linked to North Korean Hackers

New MacOS Malware Linked to North Korean Hackers 07/11/2023 at 18:04 By Kevin Townsend New macOS malware, tracked by Jamf as ObjCShellz, is likely being used by North Korean hackers to target crypto exchanges The post New MacOS Malware Linked to North Korean Hackers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

New MacOS Malware Linked to North Korean Hackers Read More »

KandyKorn macOS malware lobbed at blockchain engineers

KandyKorn macOS malware lobbed at blockchain engineers 03/11/2023 at 15:46 By Helga Labus North Korean hackers are using novel MacOS malware named KandyKorn to target blockchain engineers of a cryptocurrency exchange platform. The attack By impersonating blockchain engineering community members on Discord, the attackers used social engineering techniques to make victims download a malicious ZIP

React to this headline:

Loading spinner

KandyKorn macOS malware lobbed at blockchain engineers Read More »

Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution

Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution 01/11/2023 at 16:01 By Ionut Arghire Threat actors are constantly publishing malicious NuGet packages to automatically execute code on developers’ machines. The post Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution Read More »

BiBi-Linux wiper targets Israeli companies

BiBi-Linux wiper targets Israeli companies 31/10/2023 at 15:01 By Helga Labus Attackers have started using new wiper malware called BiBi-Linux to attack Israeli companies and destroy their data. The BiBi-Linux wiper The Security Joes Incident Response team found the malware during a forensics investigation of a breach within an Israeli company. “This malware is an

React to this headline:

Loading spinner

BiBi-Linux wiper targets Israeli companies Read More »

Finding the right approach to security awareness

Finding the right approach to security awareness 30/10/2023 at 09:02 By Help Net Security As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital. Security awareness training is essential and must be a live, evolving process. In this Help Net Security

React to this headline:

Loading spinner

Finding the right approach to security awareness Read More »

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools 27/10/2023 at 17:47 By Ionut Arghire The StripedFly malware has APT-like capabilities, but remained unnoticed for five years, posing as a cryptocurrency miner. The post Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools Read More »

IoT security threats highlight the need for zero trust principles

IoT security threats highlight the need for zero trust principles 27/10/2023 at 07:31 By Help Net Security The high number of attacks on IoT devices represents a 400% increase in malware compared to the previous year, according to Zscaler. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security,

React to this headline:

Loading spinner

IoT security threats highlight the need for zero trust principles Read More »

SMBs at risk as AI misconceptions lead to overconfidence

SMBs at risk as AI misconceptions lead to overconfidence 27/10/2023 at 07:03 By Help Net Security Despite advancements in IT security measures, SMBs remain firmly in the crosshairs of cybercriminals, according to Devolutions. Ransomware payments and IoT malware incidents soar Spikes in incidents such as ransomware payments and IoT malware attacks indicate that this year

React to this headline:

Loading spinner

SMBs at risk as AI misconceptions lead to overconfidence Read More »

Bracing for AI-enabled ransomware and cyber extortion attacks

Bracing for AI-enabled ransomware and cyber extortion attacks 24/10/2023 at 07:37 By Help Net Security AI has been the shiniest thing in tech since at least November 2022, when ChatGPT was made available to the masses and unveiled the transformative potential of large language models for all the world to see. As businesses scramble to

React to this headline:

Loading spinner

Bracing for AI-enabled ransomware and cyber extortion attacks Read More »

New Enchant Android Malware Targeting Chinese Cryptocurrency Users

New Enchant Android Malware Targeting Chinese Cryptocurrency Users 23/10/2023 at 14:01 By cybleinc Cyble Research and Intelligence Labs analyzes a New Android malware “Enchant” targeting cryptocurrency users in China. The post New Enchant Android Malware Targeting Chinese Cryptocurrency Users appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to

React to this headline:

Loading spinner

New Enchant Android Malware Targeting Chinese Cryptocurrency Users Read More »

Researchers uncover DarkGate malware’s Vietnamese connection

Researchers uncover DarkGate malware’s Vietnamese connection 20/10/2023 at 14:02 By Help Net Security WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan (RAT) that has been used in attacks since at least 2018 and is currently available to cybercriminals as

React to this headline:

Loading spinner

Researchers uncover DarkGate malware’s Vietnamese connection Read More »

EtherHiding: Why hackers may prefer Binance’s BNB Smart Chain

EtherHiding: Why hackers may prefer Binance’s BNB Smart Chain 20/10/2023 at 10:04 By Cointelegraph By Martin Young According to cybersecurity analysts at 0xScope and CertiK, threat actors may prefer using BNB Smart Chain contracts because it’s cheaper and seen as having lower security than Ethereum. This article is an excerpt from Cointelegraph.com News View Original

React to this headline:

Loading spinner

EtherHiding: Why hackers may prefer Binance’s BNB Smart Chain Read More »

The double-edged sword of heightened regulation for financial services

The double-edged sword of heightened regulation for financial services 20/10/2023 at 06:04 By Help Net Security Financial services organizations are enticing targets for cybercriminals due to their significant wealth holdings, presenting abundant opportunities for monetary gain through extortion, theft, and fraud, according to Trustwave. In addition to the money itself, the financial services sector stores

React to this headline:

Loading spinner

The double-edged sword of heightened regulation for financial services Read More »

Google Play Protect takes on malicious apps with code-level scanning

Google Play Protect takes on malicious apps with code-level scanning 19/10/2023 at 13:47 By Helga Labus Google is enhancing Google Play Protect’s real-time scanning to include code-level scanning, to keep Android devices safe from malicious and unwanted apps, especially those downloaded (or sideloaded) from outside of the Google Play app store – whether from third-party

React to this headline:

Loading spinner

Google Play Protect takes on malicious apps with code-level scanning Read More »

Google ads for KeePass, Notepad++ lead to malware

Google ads for KeePass, Notepad++ lead to malware 19/10/2023 at 12:16 By Zeljka Zorz Users using Google to search for and download the KeePass password manager and the Notepad++ text editor may have inadvertently gotten saddled with malware, says Jérôme Segura, Director of Threat Intelligence at Malwarebytes. Malvertising via search engine ads is a constant,

React to this headline:

Loading spinner

Google ads for KeePass, Notepad++ lead to malware Read More »

Cyber resilience starts in the C-suite

Cyber resilience starts in the C-suite 19/10/2023 at 06:33 By Help Net Security In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs or managing directors and 21% of other senior leaders are heavily involved, according to Commvault. According to the research, 52% of senior

React to this headline:

Loading spinner

Cyber resilience starts in the C-suite Read More »

Fileless Pure Clipper Malware: Italian users in the crosshairs

Fileless Pure Clipper Malware: Italian users in the crosshairs 18/10/2023 at 15:18 By cybleinc Key Takeaways Overview In a recent investigation, the CRIL found an operation orchestrated by a Threat Actor (TA) through a deceptive phishing site that imitated the official Tor Project website. The TA was spreading Pure Clipper in this operation. Clipper is

React to this headline:

Loading spinner

Fileless Pure Clipper Malware: Italian users in the crosshairs Read More »

Jupyter Notebooks targeted by cryptojackers

Jupyter Notebooks targeted by cryptojackers 18/10/2023 at 14:36 By Helga Labus Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are Jupyter Notebooks? “Jupyter is a service that allows you to host individual snippets of code and lets others execute this code in

React to this headline:

Loading spinner

Jupyter Notebooks targeted by cryptojackers Read More »

Scroll to Top