May 24, 2023
Via: The Hacker NewsGoogle has removed a screen recording app named “iRecorder – Screen Recorder” from the Play Store after it was found to sneak in information stealing capabilities nearly a year after the app was published as an innocuous app. The app […]
May 12, 2023
Via: TechSpotLast month, we learned that malware had been discovered in 60 Android apps with over 100 million downloads – another black eye for the mobile operating system that has an estimated three billion active users worldwide. Malicious developers regularly exploit […]
May 9, 2023
Via: TechradarA new ransomware variant has been detected that is able to evade detection by encrypting itself. Cybersecurity researchers from risk and financial advisory solutions firm Kroll recently discovered a variant of the ransomware known as Cactus. Besides the usual operation […]
May 8, 2023
Via: TechSpotSecurity researchers have confirmed that private keys for MSI products and Intel Boot Guard are loose in the wild. Hackers could use the keys to sign malware under the guise of official MSI firmware. Intel Boot Guard is a critical […]
April 26, 2023
Via: TechSpotThe Gootloader malware originated from the Gootkit banking trojan, which has been active against European targets since 2010. The malicious operation allows third-party criminals to put their malware (especially ransomware) into a compromised network. The gang behind it has been […]
March 13, 2023
Via: The Hacker NewsThreat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon, RedLine, and Vidar. “The videos lure users by pretending to be tutorials on how to download cracked versions of software […]
February 24, 2023
Via: PhoneArenaThere’s a new malware roaming free online right now. It hijacks people’s social media accounts, steals login credentials, and mines cryptocurrencies using people’s devices, reports TechRadar. New malware exploits users’ YouTube and Facebook account The info comes from researchers from […]
February 23, 2023
Via: The Hacker NewsTrojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs, which made the discovery, said the XMRig coin miner was executed by means of an unauthorized modification in Final Cut […]
February 11, 2023
Via: TechradarCybersecurity researchers from Proofpoint have uncovered a brand new, custom-built malware being used by threat actors to deliver a wide variety of specifically tailored stage-two attacks. These payloads are capable of different things, from espionage to data theft, making the […]
January 31, 2023
Via: TechradarA new cyberattack that appears to be targeted at Ukraine and is designed to overwrite crucial Windows files has been spotted by security firm ESET. “On January 25th #ESETResearch discovered a new cyberattack in Ukraine. Attackers deployed a new wiper […]
January 20, 2023
Via: The Hacker NewsA suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks targeting a European government entity and a managed service provider (MSP) located in Africa. Telemetry evidence gathered by Google-owned Mandiant indicates […]
January 9, 2023
Via: TechradarVSCode Marketplace, a repository for Visual Studio Code (VSC) externsions, has poor security defenses, allowing threat actors to abuse it and distribute malicious code among the millions of its users, experts have warned. A report from AquaSec tested the platform […]
December 13, 2022
Via: The Hacker NewsAn active malware campaign is targeting the Python Package Index (PyPI) and npm repositories for Python and JavaScript with typosquatted and fake modules that deploy a ransomware strain, marking the latest security issue to affect software supply chains. The typosquatted […]
November 18, 2022
Via: TechradarA Russian-speaking cybercrime group was observed combining powerful infostealing malware with typosquatted domains to steal(opens in new tab) login data for banking sites. The campaign was spotted by cybersecurity experts Hold Security, and reported on by KrebsOnSecurity. According to the […]
November 8, 2022
Via: TechradarA new data-wiping malware has been detected, infecting more and more endpoints with each passing day – but what’s most curious is that it poses as ransomware(opens in new tab). The malware is called Azov Ransomware, and when run on […]
November 8, 2022
Via: The Hacker NewsThe Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. “Amadey bot, the malware that is used to install LockBit, is being distributed through two methods: one using a malicious Word document file, […]
November 1, 2022
Via: TechradarCybersecurity researchers from Symantec have discovered a brand new dropper that lurks for months before deploying backdoors, malware(opens in new tab), and other malicious tools. In a blog post(opens in new tab), the company outlined the dropper, known as Geppei, […]
October 25, 2022
Via: The Hacker NewsTwo point-of-sale (PoS) malware variants have been put to use by a threat actor to steal information related to more than 167,000 credit cards from payment terminals. According to Singapore-headquartered cybersecurity company Group-IB, the stolen data dumps could net the […]
October 24, 2022
Via: TechradarMore than one in every ten GitHub repositories sharing exploit proof-of-concepts could be holding some form of malware or malicious content, putting software developers and cybersecurity researchers at plenty of risk, experts have found. GitHub is used, among other things, […]
October 6, 2022
Via: TechradarThere is a new malware making rounds, that targets Microsoft SQL servers, and is capable of running programs, snooping in on data, brute-forcing its way into other SQL servers, and dozens of other dangerous things. The malware(opens in new tab), […]