June 19, 2023
Via: The VergeA ransomware group is claiming responsibility for a hack on Reddit’s systems earlier this year — and demanding not just money but policy changes. BlackCat, a ransomware group, says it was behind the February phishing attack on Reddit, as previously […]
June 15, 2023
Via: The Hacker NewsRansomware actors and cryptocurrency scammers have joined nation-state actors in abusing cloud mining services to launder digital assets, new findings reveal. “Cryptocurrency mining is a crucial part of our industry, but it also holds special appeal to bad actors, as […]
June 13, 2023
Via: InfoWorldAlthough I’m swearing off studies as blog fodder, it did come to my attention that Vulcan Cyber’s Voyager18 research team recently issued an advisory validating that generative AI, such as ChatGPT, would be turned into a weapon quickly, ready to […]
Computing, Hacking, Hardware, Security
May 31, 2023
Via: Tech XploreA team of security researchers at Georgia Tech, the University of Michigan and Ruhr University Bochum in Germany has reported a new form of side-channel attack that capitalizes on power and speed management methods used by graphics processing units and […]
May 25, 2023
Via: TechSpotMicrosoft said that the hackers, codenamed Volt Typhoon, have been in operation since mid-2021. By exploiting vulnerabilities in internet-facing Fortinet FortiGuard devices that admins never patched, the attackers are able to extract credentials to a network’s Active Directory, and use […]
May 10, 2023
Via: The Hacker NewsThe U.S. government on Tuesday announced the court-authorized disruption of a global network compromised by an advanced malware strain known as Snake wielded by Russia’s Federal Security Service (FSB). Snake, dubbed the “most sophisticated cyber espionage tool,” is the handiwork […]
May 9, 2023
Via: TechradarA new ransomware variant has been detected that is able to evade detection by encrypting itself. Cybersecurity researchers from risk and financial advisory solutions firm Kroll recently discovered a variant of the ransomware known as Cactus. Besides the usual operation […]
May 8, 2023
Via: TechSpotSecurity researchers have confirmed that private keys for MSI products and Intel Boot Guard are loose in the wild. Hackers could use the keys to sign malware under the guise of official MSI firmware. Intel Boot Guard is a critical […]
May 8, 2023
Via: The Hacker NewsDigital storage giant Western Digital confirmed that an “unauthorized third party” gained access to its systems and stole personal information belonging to the company’s online store customers. “This information included customer names, billing and shipping addresses, email addresses and telephone […]
May 5, 2023
Via: MashableIf you see a verified page, complete with the blue checkmark, on Facebook…don’t automatically assume that page is legit. Mashable can confirm that a number of fake Facebook business pages have been masquerading as companies such as Google and even […]
April 26, 2023
Via: TechSpotThe Gootloader malware originated from the Gootkit banking trojan, which has been active against European targets since 2010. The malicious operation allows third-party criminals to put their malware (especially ransomware) into a compromised network. The gang behind it has been […]
April 26, 2023
Via: The Hacker NewsThe browser serves as the primary interface between the on-premises environment, the cloud, and the web in the modern enterprise. Therefore, the browser is also exposed to multiple types of cyber threats and operational risks. In light of this significant […]
April 19, 2023
Via: TechradarCheck Point Research (CPR) has released a new report which highlights the brands most frequently imitated in phishing campaigns in 2023 so far, and it contains some surprising results. The company’s Brand Phishing Report for Q1 2023 found several big […]
April 19, 2023
Via: TechradarOver two-thirds (68%) of organizations say they suffered a cyberattack at some point during the last twelve months, new figures from Netwrix have claimed. The cybersecurity firm polled 1,610 IT professionals from 106 countries and published the results in its […]
April 11, 2023
Via: TechSpotIn a new report published this week, security company Kaspersky describes a dark web market offering services to hack targets with Android malware and spyware. Hackers can sneak much of that malicious code onto the Google Play Store, circumventing Google’s […]
March 16, 2023
Via: TechradarAn unnamed U.S. civilian executive branch has unintentionally been feeding intel to cybercriminals and state-sponsored threat actors for six months, a new report from the country’s law enforcement and intelligence agencies claims. Earlier this week, the Cybersecurity and Infrastructure Security […]
March 13, 2023
Via: The Hacker NewsThreat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon, RedLine, and Vidar. “The videos lure users by pretending to be tutorials on how to download cracked versions of software […]
February 28, 2023
Via: Tech XploreCybercriminals are coming up with increasingly savvy ways to disrupt online services, access sensitive data or crash internet user’s devices. A cyber-attack that has become very common over the past decades is the so-called Distributed Denial of Service (DDoS) attack. […]
February 24, 2023
Via: PhoneArenaThere’s a new malware roaming free online right now. It hijacks people’s social media accounts, steals login credentials, and mines cryptocurrencies using people’s devices, reports TechRadar. New malware exploits users’ YouTube and Facebook account The info comes from researchers from […]
February 23, 2023
Via: The Hacker NewsTrojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs, which made the discovery, said the XMRig coin miner was executed by means of an unauthorized modification in Final Cut […]