Malware

Malware peddlers love this one social engineering trick!

Malware peddlers love this one social engineering trick! 2024-06-17 at 16:16 By Zeljka Zorz Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem but also offers a way to fix it (Source: Proofpoint) Social engineering users to install malware […]

React to this headline:

Loading spinner

Malware peddlers love this one social engineering trick! Read More »

20,000 FortiGate appliances compromised by Chinese hackers

20,000 FortiGate appliances compromised by Chinese hackers 2024-06-12 at 14:16 By Zeljka Zorz Coathanger – a piece of malware specifically built to persist on Fortinet’s FortiGate appliances – may still be lurking on too many devices deployed worldwide. How Coathanger persists on FortiGate devices In February 2024, the Dutch Military Intelligence and Security Service (MIVD)

React to this headline:

Loading spinner

20,000 FortiGate appliances compromised by Chinese hackers Read More »

90% of threats are social engineering

90% of threats are social engineering 2024-06-06 at 06:32 By Help Net Security In this Help Net Security video, Jakub Kroustek, Malware Research Director at Gen, discusses the Avast Q1 2024 Threat Report. The report highlights significant trends and incidents in cybersecurity. Key findings include: Surge in social engineering attacks: Nearly 90% of threats blocked

React to this headline:

Loading spinner

90% of threats are social engineering Read More »

Chinese attackers leverage previously unseen malware for espionage

Chinese attackers leverage previously unseen malware for espionage 2024-06-06 at 05:46 By Help Net Security Sophos released its report, “Operation Crimson Palace: Threat Hunting Unveils Multiple Clusters of Chinese State-Sponsored Activity Targeting Southeast Asia,” which details a highly sophisticated, nearly two-year long espionage campaign against a high-level government target. During Sophos X-Ops’ investigation, which began

React to this headline:

Loading spinner

Chinese attackers leverage previously unseen malware for espionage Read More »

Researchers Show How Malware Could Steal Windows Recall Data

Researchers Show How Malware Could Steal Windows Recall Data 2024-06-05 at 16:31 By Eduard Kovacs Cybersecurity researchers are demonstrating how malware could steal data collected by the new Windows Recall feature. The post Researchers Show How Malware Could Steal Windows Recall Data appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Researchers Show How Malware Could Steal Windows Recall Data Read More »

TrickBot and Other Malware Droppers Disrupted by Law Enforcement

TrickBot and Other Malware Droppers Disrupted by Law Enforcement 2024-05-30 at 15:32 By Ionut Arghire The TrickBot botnet and other malware droppers have been targeted by international law enforcement in Operation Endgame. The post TrickBot and Other Malware Droppers Disrupted by Law Enforcement appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

TrickBot and Other Malware Droppers Disrupted by Law Enforcement Read More »

Compromised recording software was served from vendor’s official site, threat researchers say

Compromised recording software was served from vendor’s official site, threat researchers say 2024-05-23 at 18:01 By Zeljka Zorz Legitimate recording software JAVS Viewer has been saddled with loader malware and has been served from the developer’s site since at least April 2, a threat researcher has warned last month. After analyzing a flagged installer detected

React to this headline:

Loading spinner

Compromised recording software was served from vendor’s official site, threat researchers say Read More »

New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data

New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data 2024-05-17 at 14:46 By Ionut Arghire The Antidot Android banking trojan snoops on users and steals their credentials, contacts, and SMS messages. The post New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data Read More »

Ebury botnet compromises 400,000+ Linux servers

Ebury botnet compromises 400,000+ Linux servers 2024-05-16 at 07:31 By Help Net Security ESET researchers released its deep-dive investigation into one of the most advanced server-side malware campaigns. It is still growing and has seen hundreds of thousands of compromised servers in its at least 15-year-long operation. The Ebury group and botnet have been involved

React to this headline:

Loading spinner

Ebury botnet compromises 400,000+ Linux servers Read More »

Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb

Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb 2024-05-16 at 07:01 By Help Net Security A study by PageFair revealed that ad blocker usage surged by 30% in 2016 alone, reflecting a growing public concern for privacy and uninterrupted browsing. Fast-forward to today, and the numbers are even more dramatic. According to Forbes, Americans

React to this headline:

Loading spinner

Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb Read More »

How attackers deliver malware to Foxit PDF Reader users

How attackers deliver malware to Foxit PDF Reader users 2024-05-15 at 16:31 By Zeljka Zorz Threat actors are taking advantage of the flawed design of Foxit PDF Reader’s alerts to deliver malware via booby-trapped PDF documents, Check Point researchers have warned. Exploiting the issue The researchers have analyzed several campaigns using malicious PDF files that

React to this headline:

Loading spinner

How attackers deliver malware to Foxit PDF Reader users Read More »

400,000 Linux Servers Hit by Ebury Botnet 

400,000 Linux Servers Hit by Ebury Botnet  2024-05-15 at 15:01 By Ionut Arghire The Ebury Linux botnet has ensnared over 400,000 Linux systems in 15 years, with roughly 100,000 still infected. The post 400,000 Linux Servers Hit by Ebury Botnet  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

400,000 Linux Servers Hit by Ebury Botnet  Read More »

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks 2024-05-14 at 15:31 By Ionut Arghire Threat actors are using DNS tunneling to track victims’ interaction with spam and to scan network infrastructures. The post Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks Read More »

New SOHO router malware aims for cloud accounts, internal company resources

New SOHO router malware aims for cloud accounts, internal company resources 2024-05-02 at 14:46 By Zeljka Zorz Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account credentials / secrets for AWS, CloudFlare, Docker, BitBucket and other cloud-based services. “With the stolen key material, the

React to this headline:

Loading spinner

New SOHO router malware aims for cloud accounts, internal company resources Read More »

Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices

Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices 2024-04-26 at 17:16 By Ionut Arghire A new Android trojan named Brokewell can steal user’s sensitive information and allows attackers to take over devices. The post Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices Read More »

North Korean Hackers Hijack Antivirus Updates for Malware Delivery

North Korean Hackers Hijack Antivirus Updates for Malware Delivery 2024-04-24 at 18:17 By Ionut Arghire A North Korea-linked threat actor hijacked the update mechanism of eScan antivirus to deploy backdoors and cryptocurrency miners. The post North Korean Hackers Hijack Antivirus Updates for Malware Delivery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

North Korean Hackers Hijack Antivirus Updates for Malware Delivery Read More »

Threat Actor Uses Multiple Infostealers in Global Campaign

Threat Actor Uses Multiple Infostealers in Global Campaign 2024-04-24 at 16:16 By Ionut Arghire A threat actor tracked as CoralRaider has been using multiple infostealers to harvest credentials from users worldwide. The post Threat Actor Uses Multiple Infostealers in Global Campaign appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Threat Actor Uses Multiple Infostealers in Global Campaign Read More »

AI set to play key role in future phishing attacks

AI set to play key role in future phishing attacks 2024-04-24 at 07:01 By Help Net Security A staggering increase in QR code phishing (quishing) attacks during 2023 saw them skyrocket up the list of concerns for cyber teams globally, according to Egress. Attacks were both prolific and highly successful, demonstrating how cybercriminals effectively combine

React to this headline:

Loading spinner

AI set to play key role in future phishing attacks Read More »

Russian Cyberspies Deliver ‘GooseEgg’ Malware to Government Organizations 

Russian Cyberspies Deliver ‘GooseEgg’ Malware to Government Organizations  2024-04-23 at 17:16 By Ionut Arghire Russia-linked APT28 deploys the GooseEgg post-exploitation tool against numerous US and European organizations. The post Russian Cyberspies Deliver ‘GooseEgg’ Malware to Government Organizations  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Russian Cyberspies Deliver ‘GooseEgg’ Malware to Government Organizations  Read More »

Scroll to Top