24 Feb Ransomware used as decoy in data-wiping attacks on UkraineThe new data wiper malware deployed on Ukrainian networks in destructive attacks on Wednesday right before Russia invaded Ukraine earlier today was, in some cases, accompanied by a GoLang-based ransomware decoy. […]
24 Feb Malware infiltrates Microsoft Store via clones of popular gamesA malware named Electron Bot has found its way into Microsoft’s Official Store through clones of popular games such as Subway Surfer and Temple Run, leading to the infection of 5,000 computers in Sweden, Israel, Spain, and Bermuda. […]
23 Feb NSA-linked Bvp47 Linux backdoor widely undetected for 10 yearsA report released today dives deep into technical aspects of a Linux backdoor now tracked as Bvp47 that is linked to the Equation Group, the advanced persistent threat actor tied to the U.S. National Security Agency. […]
23 Feb Network hackers focus on selling high-value targets in the U.S.A Crowdstrike report looking into access brokers’ advertisements since 2019 has identified a preference in academic, government, and technology entities based in the United States. […]
23 Feb New data-wiping malware used in destructive attacks on UkraineCybersecurity firms have found a new data wiper used in destructive attacks today against Ukrainian networks just as Russia moves troops into regions of Ukraine. […]
23 Feb Ransomware extortion doesn’t stop after paying the ransomA global survey that looked into the experience of ransomware victims highlights the lack of trustworthiness of ransomware actors, as in most cases of paying the ransom, the extortion simply continues. […]
23 Feb Nigerian hacker pleads guilty to stealing payroll depositsA Nigerian national named Charles Onus has pled guilty in the District Court of the Southern District of New York to hacking into a payroll company’s user accounts and stealing payroll deposits. […]
22 Feb Devious phishing method bypasses MFA using remote access softwareA devious new phishing technique allows attackers to bypass MFA by secretly having victims log in to their accounts directly on attacker-controlled servers using VNC. […]
22 Feb Google Chrome to allow users to add notes to saved passwordsGoogle is testing a new Chrome feature that allows users to add notes on passwords saved in the web browser. […]
22 Feb Vulnerable Microsoft SQL Servers targeted with Cobalt StrikeThreat analysts have observed a new wave of attacks installing Cobalt Strike beacons on vulnerable Microsoft SQL Servers, leading to deeper infiltration and subsequent malware infections. […]