22.8 C
New York

Tag: Malware

Content Creators Will Be Able To Display Their NFT Creations on Facebook

On June 29, Navdeep Singh, Meta’s technical program manager, showed on his social media channels a glimpse of Facebook’s new NFT PFP feature, which...

Top News

Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data

CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers. The Cybersecurity and Infrastructure Security Agency (CISA) and Coast...

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers. Advanced...

S3 Ep88: Phone scammers, hacking bust, and data breach fines [Podcast]

by Paul Ducklin LISTEN NOW Click-and-drag on the soundwaves below to skip to any point. You can also listen directly on Soundcloud. Duck gets behind the Ducks. ...

Elusive ToddyCat APT Targets Microsoft Exchange Servers

The threat actor targets institutions and companies in Europe and Asia. An advanced persistent threat (APT) group, dubbed ToddyCat, is believed behind a series of...

Capital One identity theft hacker finally gets convicted

by Paul Ducklin Remember the Capital One breach? We did, though we felt sure it had happened a long time ago. Indeed, when we checked, it had: the...

Kazakh Govt. Used Spyware Against Protesters

Researchers have discovered that a Kazakhstan government entity deployed sophisticated Italian spyware within its borders. An agent of the Kazakhstan government has been using enterprise-grade...
Tag Template - News Hub PRO CoinGenius Hosts Virtual Crypto Event The Road To Mass Adoption

Kazakh Govt. Used Spyware Against Protesters

Researchers have discovered that a Kazakhstan government entity deployed sophisticated Italian spyware within its borders. An agent of the Kazakhstan government has been using enterprise-grade...

China-linked APT Flew Under Radar for Decade

Evidence suggests that a just-discovered APT has been active since 2013. Researchers have identified a small yet potent China-linked APT that has flown under the...

Linux Malware Deemed ‘Nearly Impossible’ to Detect

Symbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit functionality and install a backdoor for remote access. A new...

You’re invited! Join us for a live walkthrough of the “Follina” story…

by Paul Ducklin On Thursday this week (16 June 2022 at 15:00 UK time), we’re holding a free webinar in which we’ll give you a live...

Potent Emotet Variant Spreads Via Stolen Email Credentials

The dangerous malware appears to be well and truly back in action, sporting new variants and security-dodging behaviors in a wave of recent phishing...
Tag Template - News Hub PRO CoinGenius Hosts Virtual Crypto Event The Road To Mass Adoption

Recent articles

spot_img