Generative Data Intelligence

Tag: malware

Consumers, Financial Institutions & Fraudsters: The Good, the Bad and the Ugly of Fraud

In the digital age, the younger generation finds itself increasingly targeted by fraudsters and falling prey to various scams. A recent TD Bank report revealed alarming...

Top News

Japan Blames North Korea for PyPI Supply Chain Cyberattack

Japanese cybersecurity officials warned that North Korea's infamous Lazarus Group hacking team recently waged a supply chain attack targeting the PyPI software repository for...

CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...

How This Web3 Gamer Loses Crypto Life Savings to Compromised Software | BitPinas

A Portuguese web3 enthusiast lost his entire crypto net worth which he noted as his life savings, amounting to $20k, in a hack. The...

Infostealer malware is coming for your ChatGPT credentials

Stolen ChatGPT credentials are a hot commodity on the dark web, according to Singapore-based threat intelligence firm Group-IB, which claims to have found some...

How CISA Fights Cyber Threats During Election Primary Season

After US election integrity and security took center stage as a political football after the 2020 Presidential race, the Cybersecurity and Infrastructure Security Agency (CISA)...

Linux Variants of Bifrost Trojan Evade Detection via Typosquatting

A 20-year-old Trojan resurfaced recently with new variants that target Linux and impersonate a trusted hosted domain to evade detection.Researchers from Palo Alto Networks...

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...

10 Essential Processes for Reducing the Top 11 Cloud Risks

It's an old trope by now that anyone not moving to the cloud is falling behind. As a result, cloud security has been on...

Top 10 scams targeting seniors – and how to stay safe

Scams The internet can be a wonderful place. But it’s also awash with...

GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia

Cybercriminals have developed an enhanced version of the infamous GhostLocker ransomware that they are deploying in attacks across the Middle East, Africa, and Asia.Two...

Predator Spyware Alive & Well and Expanding

The infamous Predator mobile spyware operation publicly exposed in an eye-popping report last year by Amnesty International has revamped its malware delivery network and...

Latest Intelligence

spot_img
spot_img
spot_img