Malware

Indian Taxpayers face a Multifaceted Threat with Drinik Malware’s Return

Indian Taxpayers face a Multifaceted Threat with Drinik Malware’s Return 20/09/2023 at 15:03 By cybleinc Cyble analyses the latest version of the Drinik malware, featuring newly added functionalities targeting Indian taxpayers. The post Indian Taxpayers face a Multifaceted Threat with Drinik Malware’s Return appeared first on Cyble. This article is an excerpt from Cyble View […]

React to this headline:

Loading spinner

Indian Taxpayers face a Multifaceted Threat with Drinik Malware’s Return Read More »

Emerging Threat: Understanding the PySilon Discord RAT’s Versatile Features

Emerging Threat: Understanding the PySilon Discord RAT’s Versatile Features 18/09/2023 at 18:09 By cybleinc Cyble Research and Intelligence Labs analyzes the Emerging PySilon Discord RAT and Explores its Versatile functionalities. The post Emerging Threat: Understanding the PySilon Discord RAT’s Versatile Features appeared first on Cyble. This article is an excerpt from Cyble View Original Source

React to this headline:

Loading spinner

Emerging Threat: Understanding the PySilon Discord RAT’s Versatile Features Read More »

Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion

Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion 18/09/2023 at 12:32 By Mirko Zorz Today, Dragos revealed that it has secured a $74 million Series D extension funding round, spearheaded by the strategic operating and investment firm WestCap. The funding extension comes when global governments and infrastructure providers increasingly acknowledge

React to this headline:

Loading spinner

Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion Read More »

Tatar-Language Users in the Crosshairs of Python Screenshotter

Tatar-Language Users in the Crosshairs of Python Screenshotter 14/09/2023 at 20:17 By rohansinhacyblecom Key Takeaways • Cyble Research and Intelligence Labs (CRIL) came across Python malware capturing screenshots and sending them over FTP to remote attackers.• Proofpoint has observed similar campaigns in the recent past targeting the United States and Germany, with the perpetrator tracked

React to this headline:

Loading spinner

Tatar-Language Users in the Crosshairs of Python Screenshotter Read More »

Android Users in South Korea targeted by spyware linked to Chinese Threat Actor

Android Users in South Korea targeted by spyware linked to Chinese Threat Actor 14/09/2023 at 20:17 By rohansinhacyblecom Key Takeaways Overview Cyble Research and Intelligence Labs (CRIL) identified a new Android Spyware campaign using VirusTotal intelligence. The campaign has been conducted by a China-linked Threat Actor specifically targeting Android users in South Korea since the

React to this headline:

Loading spinner

Android Users in South Korea targeted by spyware linked to Chinese Threat Actor Read More »

New Remo Android Banking Trojan Targets Over 50 Banking Applications And Crypto Wallets

New Remo Android Banking Trojan Targets Over 50 Banking Applications And Crypto Wallets 14/09/2023 at 20:17 By dakshsharma16 CRIL analyzes a newly discovered Remo Android Banking Trojan targeting over 50 banking and cryptocurrency wallet applications from Indonesia, Vietnam, and Thailand. The post New Remo Android Banking Trojan Targets Over 50 Banking Applications And Crypto Wallets

React to this headline:

Loading spinner

New Remo Android Banking Trojan Targets Over 50 Banking Applications And Crypto Wallets Read More »

MetaStealer malware is targeting enterprise macOS users

MetaStealer malware is targeting enterprise macOS users 13/09/2023 at 14:32 By Helga Labus Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within malicious disk image format (.dmg) files. The names of the files – such as Advertising terms of reference (MacOS presentation).dmg and

React to this headline:

Loading spinner

MetaStealer malware is targeting enterprise macOS users Read More »

The rise and evolution of supply chain attacks

The rise and evolution of supply chain attacks 13/09/2023 at 07:03 By Help Net Security A supply chain attack is a cyberattack that focuses on a third-party supplier providing essential services or software to the supply chain. In this Help Net Security video, Dick O’Brien, Principal Intelligence Analyst in the Symantec Threat Hunter team, discusses

React to this headline:

Loading spinner

The rise and evolution of supply chain attacks Read More »

Microsoft Teams users targeted in phishing attack delivering DarkGate malware

Microsoft Teams users targeted in phishing attack delivering DarkGate malware 11/09/2023 at 13:31 By Helga Labus A new phishing campaign taking advantage of an easily exploitable issue in Microsoft Teams to deliver malware has been flagged by researchers. Delivering malware to Microsoft Teams users Late last month, Truesec researchers spotted two compromised Microsoft 365 accounts

React to this headline:

Loading spinner

Microsoft Teams users targeted in phishing attack delivering DarkGate malware Read More »

Email forwarding flaws enable attackers to impersonate high-profile domains

Email forwarding flaws enable attackers to impersonate high-profile domains 11/09/2023 at 07:02 By Help Net Security Sending an email with a forged address is easier than previously thought, due to flaws in the process that allows email forwarding, according to a research team led by computer scientists at the University of California San Diego. The

React to this headline:

Loading spinner

Email forwarding flaws enable attackers to impersonate high-profile domains Read More »

Best practices for implementing a proper backup strategy

Best practices for implementing a proper backup strategy 08/09/2023 at 07:01 By Help Net Security Implementing a robust backup strategy for safeguarding crucial business data is more essential than ever. Without such a plan, organizations risk paying ransoms and incurring expenses related to investigations and lost productivity. In this Help Net Security video, David Boland,

React to this headline:

Loading spinner

Best practices for implementing a proper backup strategy Read More »

MacOS malware has a new trick up its sleeve

MacOS malware has a new trick up its sleeve 07/09/2023 at 15:02 By Helga Labus A newer version of the Atomic Stealer macOS malware has a new trick that allows it to bypass the operating system’s Gatekeeper, Malwarebytes researchers have discovered. Mac malware delivered through Google ads The malware, which was first advertised in April

React to this headline:

Loading spinner

MacOS malware has a new trick up its sleeve Read More »

Old vulnerabilities are still a big problem

Old vulnerabilities are still a big problem 06/09/2023 at 17:01 By Zeljka Zorz A recently flagged phishing campaign aimed at delivering the Agent Tesla RAT to unsuspecting users takes advantage of old vulnerabilities in Microsoft Office that allow remote code execution. “Despite fixes for CVE-2017-11882/CVE-2018-0802 being released by Microsoft in November, 2017 and January, 2018,

React to this headline:

Loading spinner

Old vulnerabilities are still a big problem Read More »

Connected cars and cybercrime: A primer

Connected cars and cybercrime: A primer 05/09/2023 at 08:02 By Help Net Security Original equipment suppliers (OEMs) and their suppliers who are weighing how to invest their budgets might be inclined to slow pedal investment in addressing cyberthreats. To date, the attacks that they have encountered have remained relatively unsophisticated and not especially harmful. Analysis

React to this headline:

Loading spinner

Connected cars and cybercrime: A primer Read More »

Threat Actors Adopt, Modify Open Source ‘SapphireStealer’ Information Stealer

Threat Actors Adopt, Modify Open Source ‘SapphireStealer’ Information Stealer 01/09/2023 at 14:04 By Ionut Arghire Cisco has observed multiple threat actors adopting the SapphireStealer information stealer after its source code was released on GitHub. The post Threat Actors Adopt, Modify Open Source ‘SapphireStealer’ Information Stealer appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Threat Actors Adopt, Modify Open Source ‘SapphireStealer’ Information Stealer Read More »

Five Eyes Report: New Russian Malware Targeting Ukrainian Military Android Devices

Five Eyes Report: New Russian Malware Targeting Ukrainian Military Android Devices 31/08/2023 at 15:46 By Eduard Kovacs Five Eyes report details ‘Infamous Chisel’ malware used by Russian state-sponsored hackers to target the Ukrainian military’s Android devices.  The post Five Eyes Report: New Russian Malware Targeting Ukrainian Military Android Devices appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Five Eyes Report: New Russian Malware Targeting Ukrainian Military Android Devices Read More »

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store 31/08/2023 at 12:18 By Help Net Security ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and Signal are attributed to the China-aligned APT group GREF. Most likely active since July 2020 and since

React to this headline:

Loading spinner

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store Read More »

Scroll to Top