February 26, 2021
Via: Threat PostCybergangs are joining forces under the guise of affiliate groups and “as-a-service” models, warns Maya Horowitz, the director of threat intelligence research with Check Point Research. She said the trend is driving a new and thriving cybercriminal underground economy. Several […]
Hacker, Threats & Malware, Vulnerabilities
February 25, 2021
Via: The Hacker NewsCybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by deploying a malicious Firefox extension on target systems. “Threat actors aligned with the Chinese Communist Party’s state interests delivered a customized malicious Mozilla Firefox […]
February 25, 2021
Via: Security WeekOne of them, issued on Wednesday, said the agency’s National Coordination Center for Cybersecurity (NCCC) had observed attempts to deliver malicious documents through the System of Electronic Interaction of Executive Bodies (SEI EB), which is used by many government organizations […]
Threats & Malware, Virus & Malware
February 24, 2021
Via: The Hacker NewsThe cybersecurity world is constantly evolving to new forms of threats and vulnerabilities. But ransomware proves to be a different animal—most destructive, persistent, notoriously challenging to prevent, and is showing no signs of slowing down. Falling victim to a ransomware […]
February 22, 2021
Via: The Hacker NewsOn August 13, 2016, a hacking unit calling itself “The Shadow Brokers” announced that it had stolen malware tools and exploits used by the Equation Group, a sophisticated threat actor believed to be affiliated to the Tailored Access Operations (TAO) […]
Threats & Malware, Virus & Malware
February 18, 2021
Via: Security WeekThe malware was discovered by Patrick Wardle, a cybersecurity researcher who specializes in Apple products. Wardle has developed several free and open source security tools for Macs, and came up with the idea to look for malware designed to run […]
February 18, 2021
Via: Security WeekThe attacks at the hospitals in Dax and Villefranche-sur-Saone prompted the transfer of some patients to other facilities as the French health care system is under pressure from the coronavirus pandemic. Macron discussed the attacks with officials and workers from […]
February 16, 2021
Via: Threat PostAn Android app that’s been downloaded more than 1 billion times is riddled with flaws that can let attackers hijack app features or overwrite existing files to execute malicious code, or launch man-in-the-disk (MiTD) attacks on people’s devices, researchers discovered. […]
February 15, 2021
Via: Panda SecurityFor years we have written about malware, viruses and phishing on the Panda Security blog – but there are other ways to break into a computer. Here are three of the weirdest techniques we’ve heard of – and they really […]
February 10, 2021
Via: DataBreach TodayThe developers of LodaRAT malware, which has previously only targeted Windows devices, have developed a new variant, Loda4Android, that targets Android devices, according to Cisco Talos. LodaRAT, previously known as Gaza007, is operated by a group called Kasablanca, which uses […]
February 26, 2021
February 15, 2021
February 19, 2021
February 23, 2021
February 23, 2021
February 18, 2021
February 16, 2021
February 11, 2021