Top

Category: Threats & Malware

Threats and Malware


Malware, Threats & Malware, Virus & Malware

Criminals wielding Ryuk ransomware specialize in targeting enterprises

January 15, 2019

Via: Help Net Security

A cybercriminal group dubbed Grim Spider has been using the Ryuk ransomware to exclusively target enterprises and has managed to amass over 705 Bitcoins (around $3.7 million) from the victims in less than six months. CrowdStrike and FireEye researchers have […]


Malware, Threats & Malware, Virus & Malware

Malvertising Campaign Delivers Double Whammy of Ransomware and Info-Stealing

January 9, 2019

Via: Threat Post

The whole attack takes place in under a minute. A multi-payload and ongoing malvertising campaign is distributing a newly discovered info-stealer as well as the GandCrab ransomware. The info-stealer is named Vidar, after the Norse god Víðarr, who was the […]


Threats & Malware, Virus & Malware

USB-C to get improved security in fight against malware-laden USB sticks

January 2, 2019

Via: TechRadar

New USB technology isn’t just about raw speed, but also security, and news has emerged of an incoming authentication system that will help protect host systems from the likes of dodgy USB Type-C devices or chargers trying to install malware […]


Hacker, Threats & Malware

Hackers threaten to leak 9/11 documents

January 2, 2019

Via: TechRadar

A group of hackers could soon release a large cache of stolen 9/11 litigation documents, which they claim to be one of the biggest leaks in history, if their ransom demands are not met. The group known as Dark Overlord […]


Network security, Threats & Malware

U.S. Defense, Critical Infrastructure Companies Targeted in New Threat Campaign

December 13, 2018

Via: Dark Reading

McAfee finds malware associated with ‘Operation Sharpshooter’ on systems belonging to at least 87 organizations. A cyberthreat group using malware tied to the Sony Pictures hack of late 2014 is attacking nuclear, defense, energy, and financial companies in what appears […]


Malware, Threats & Malware, Virus & Malware

‘Tis the Season for Spreading Ad Malware

December 3, 2018

Via: Security Intelligence

Although Black Friday and Cyber Monday are behind us, consumer scams are likely to continue surging through the coming month. Malicious actors know that online retail spikes during the holiday season, so they increase their efforts to spread ad malware […]


Phishing, Threats & Malware

Roaming Mantis part III: iOS crypto-mining and spreading via malicious content delivery system

October 1, 2018

Via: Securelist

In Q2 2018, Kaspersky Lab published two blogposts about Roaming Mantis sharing details of this new cybercriminal campaign. In the beginning, the criminals used DNS hijacking in vulnerable routers to spread malicious Android applications of Roaming Mantis (aka MoqHao and […]


Hacker, Threats & Malware

ThreatList: Attacks on Industrial Control Systems on the Rise

September 7, 2018

Via: Threat Post

The systems that power the manufacturing, power and water plants, the oil and gas industry, and many other sectors are increasingly in the crosshairs of cyber-attackers: A full 41.2 percent of industrial control system (ICS) were attacked by malicious software […]


Threats & Malware, Virus & Malware

Malware on ICS Increasingly Comes From Internet: Kaspersky

September 7, 2018

Via: Security Week

According to Kaspersky’s “Threat Landscape for Industrial Automation Systems” report for H1 2018, the company detected over 19,400 samples belonging to roughly 2,800 malware families. As expected, most of the attempts to infect industrial systems were part of random attacks […]


Threats & Malware, Virus & Malware

Security Think Tank: No shortcuts to addressing software vulnerabilities

September 7, 2018

Via: Computer Weekly

Successful cyber attacks exploit weaknesses in an organisation’s defences. Hackers probe networks, looking for gaps in firewalls, and users are duped into downloading malware. These risks can be reduced through strong, consistent and regularly updated cyber security defences, alongside user […]