Malware

New Java-Based Rude Stealer abuses DirectX Diagnostic Tool

New Java-Based Rude Stealer abuses DirectX Diagnostic Tool 20/11/2023 at 14:31 By cybleinc CRIL analyzes Rude Stealer – a Java-based stealer capable of exfiltrating a wide range of information from infected systems. The post New Java-Based Rude Stealer abuses DirectX Diagnostic Tool appeared first on Cyble. This article is an excerpt from Cyble View Original […]

React to this headline:

Loading spinner

New Java-Based Rude Stealer abuses DirectX Diagnostic Tool Read More »

Threat Actor Targets ‘Batman: Arkham City’ Gamers using Meterpreter

Threat Actor Targets ‘Batman: Arkham City’ Gamers using Meterpreter 17/11/2023 at 15:17 By cybleinc CRIL analyzes a modified version of a ‘Batman: Arkham City’ game installer application that deploys Meterpreter on victim’s systems. The post Threat Actor Targets ‘Batman: Arkham City’ Gamers using Meterpreter appeared first on Cyble. This article is an excerpt from Cyble

React to this headline:

Loading spinner

Threat Actor Targets ‘Batman: Arkham City’ Gamers using Meterpreter Read More »

AI disinformation campaigns pose major threat to 2024 elections

AI disinformation campaigns pose major threat to 2024 elections 17/11/2023 at 08:32 By Help Net Security AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As the world emerged from the pandemic and continued to adapt to the rapid implementation of

React to this headline:

Loading spinner

AI disinformation campaigns pose major threat to 2024 elections Read More »

Infostealers and the high value of stolen data

Infostealers and the high value of stolen data 13/11/2023 at 08:35 By Help Net Security The risk of personal and professional data being stolen by nefarious actors looms larger than ever, according to Trend Micro. Understanding the risks associated with data theft, which include identity theft, financial loss, reputational harm, and the potential misuse of

React to this headline:

Loading spinner

Infostealers and the high value of stolen data Read More »

Sandworm hackers incapacitated Ukrainian power grid amid missile strike

Sandworm hackers incapacitated Ukrainian power grid amid missile strike 09/11/2023 at 19:17 By Helga Labus Russia-backed ATP group Sandworm is behind the cyberattack that caused disruption of parts of the Ukrainian power grid in late 2022, according to Mandiant. About Sandworm “Sandworm is a threat actor that has carried out cyber operations in support of

React to this headline:

Loading spinner

Sandworm hackers incapacitated Ukrainian power grid amid missile strike Read More »

‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools

‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools 09/11/2023 at 17:46 By Ionut Arghire Checkmarx uncovers a malicious campaign targeting Python developers with malware that takes over their systems. The post ‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

‘BlazeStealer’ Malware Delivered to Python Developers Looking for Obfuscation Tools Read More »

New MacOS Malware Linked to North Korean Hackers

New MacOS Malware Linked to North Korean Hackers 07/11/2023 at 18:04 By Kevin Townsend New macOS malware, tracked by Jamf as ObjCShellz, is likely being used by North Korean hackers to target crypto exchanges The post New MacOS Malware Linked to North Korean Hackers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

New MacOS Malware Linked to North Korean Hackers Read More »

KandyKorn macOS malware lobbed at blockchain engineers

KandyKorn macOS malware lobbed at blockchain engineers 03/11/2023 at 15:46 By Helga Labus North Korean hackers are using novel MacOS malware named KandyKorn to target blockchain engineers of a cryptocurrency exchange platform. The attack By impersonating blockchain engineering community members on Discord, the attackers used social engineering techniques to make victims download a malicious ZIP

React to this headline:

Loading spinner

KandyKorn macOS malware lobbed at blockchain engineers Read More »

Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution

Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution 01/11/2023 at 16:01 By Ionut Arghire Threat actors are constantly publishing malicious NuGet packages to automatically execute code on developers’ machines. The post Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Malicious NuGet Packages Abuse MSBuild Integrations for Code Execution Read More »

BiBi-Linux wiper targets Israeli companies

BiBi-Linux wiper targets Israeli companies 31/10/2023 at 15:01 By Helga Labus Attackers have started using new wiper malware called BiBi-Linux to attack Israeli companies and destroy their data. The BiBi-Linux wiper The Security Joes Incident Response team found the malware during a forensics investigation of a breach within an Israeli company. “This malware is an

React to this headline:

Loading spinner

BiBi-Linux wiper targets Israeli companies Read More »

Finding the right approach to security awareness

Finding the right approach to security awareness 30/10/2023 at 09:02 By Help Net Security As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital. Security awareness training is essential and must be a live, evolving process. In this Help Net Security

React to this headline:

Loading spinner

Finding the right approach to security awareness Read More »

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools 27/10/2023 at 17:47 By Ionut Arghire The StripedFly malware has APT-like capabilities, but remained unnoticed for five years, posing as a cryptocurrency miner. The post Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools Read More »

IoT security threats highlight the need for zero trust principles

IoT security threats highlight the need for zero trust principles 27/10/2023 at 07:31 By Help Net Security The high number of attacks on IoT devices represents a 400% increase in malware compared to the previous year, according to Zscaler. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security,

React to this headline:

Loading spinner

IoT security threats highlight the need for zero trust principles Read More »

SMBs at risk as AI misconceptions lead to overconfidence

SMBs at risk as AI misconceptions lead to overconfidence 27/10/2023 at 07:03 By Help Net Security Despite advancements in IT security measures, SMBs remain firmly in the crosshairs of cybercriminals, according to Devolutions. Ransomware payments and IoT malware incidents soar Spikes in incidents such as ransomware payments and IoT malware attacks indicate that this year

React to this headline:

Loading spinner

SMBs at risk as AI misconceptions lead to overconfidence Read More »

Bracing for AI-enabled ransomware and cyber extortion attacks

Bracing for AI-enabled ransomware and cyber extortion attacks 24/10/2023 at 07:37 By Help Net Security AI has been the shiniest thing in tech since at least November 2022, when ChatGPT was made available to the masses and unveiled the transformative potential of large language models for all the world to see. As businesses scramble to

React to this headline:

Loading spinner

Bracing for AI-enabled ransomware and cyber extortion attacks Read More »

New Enchant Android Malware Targeting Chinese Cryptocurrency Users

New Enchant Android Malware Targeting Chinese Cryptocurrency Users 23/10/2023 at 14:01 By cybleinc Cyble Research and Intelligence Labs analyzes a New Android malware “Enchant” targeting cryptocurrency users in China. The post New Enchant Android Malware Targeting Chinese Cryptocurrency Users appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to

React to this headline:

Loading spinner

New Enchant Android Malware Targeting Chinese Cryptocurrency Users Read More »

Researchers uncover DarkGate malware’s Vietnamese connection

Researchers uncover DarkGate malware’s Vietnamese connection 20/10/2023 at 14:02 By Help Net Security WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan (RAT) that has been used in attacks since at least 2018 and is currently available to cybercriminals as

React to this headline:

Loading spinner

Researchers uncover DarkGate malware’s Vietnamese connection Read More »

EtherHiding: Why hackers may prefer Binance’s BNB Smart Chain

EtherHiding: Why hackers may prefer Binance’s BNB Smart Chain 20/10/2023 at 10:04 By Cointelegraph By Martin Young According to cybersecurity analysts at 0xScope and CertiK, threat actors may prefer using BNB Smart Chain contracts because it’s cheaper and seen as having lower security than Ethereum. This article is an excerpt from Cointelegraph.com News View Original

React to this headline:

Loading spinner

EtherHiding: Why hackers may prefer Binance’s BNB Smart Chain Read More »

The double-edged sword of heightened regulation for financial services

The double-edged sword of heightened regulation for financial services 20/10/2023 at 06:04 By Help Net Security Financial services organizations are enticing targets for cybercriminals due to their significant wealth holdings, presenting abundant opportunities for monetary gain through extortion, theft, and fraud, according to Trustwave. In addition to the money itself, the financial services sector stores

React to this headline:

Loading spinner

The double-edged sword of heightened regulation for financial services Read More »

Google Play Protect takes on malicious apps with code-level scanning

Google Play Protect takes on malicious apps with code-level scanning 19/10/2023 at 13:47 By Helga Labus Google is enhancing Google Play Protect’s real-time scanning to include code-level scanning, to keep Android devices safe from malicious and unwanted apps, especially those downloaded (or sideloaded) from outside of the Google Play app store – whether from third-party

React to this headline:

Loading spinner

Google Play Protect takes on malicious apps with code-level scanning Read More »

Scroll to Top