Kremlin's concerns about US technology continue. Russia alleges the NSA used Apple iPhone vulnerabilities to spy on officials and civilians. And officials in Russia urged to stop using iPhones.
Malware RSS
Security experts have raised warnings about Google's new .zip and .mov top-level domains because they look like file extensions and could be used maliciously. They are already being used in the wild.
The US Department of the Treasury has sanctioned a prolific ransomware actor, Mikhail Matveev. The Department of State will also offer a $10 million reward for info that leads to his arrest.
Meta is posting more info on new malware threats. It aims to inform users about recent malware behaviors, methods of penetration, and their effort towards disrupting the spread of malware.
The CERT Ukraine has warned about a new malicious campaign that is targeting Ukrainian officials. The campaign is essentially distributing fake Windows updates via Outlook domain mails.
When you are in public and your phone's battery gets low do you ever plug it into public charging stations? You could be at risk of juice jacking. Join us today to find out how to protect yourself.
A social experiment was conducted by a security research firm pitting humans against ChatGPT. This test simulated writing of phishing scam mail and human beings have emerged victorious, for now.
CloudSEK has discovered that threat actors are recently posting YouTube videos that "offer" cracked software downloads. They are even using AI-generated avatars to make the clips look legitimate.
A new research paper discovered 721.5 million credentials exposed online. According to the study, 50% of the data came from botnets that deployed information-stealing malware to victims' devices.
A new report from the security firm Mandiant claims that a group based in North Korea is posting fake job listings on LinkedIn that eventually results in malware being downloaded to a user's PC.
A ransomware variant commonly known to target Windows PCs has recently been found infecting Linux computers as well. The variant does this by exploiting a flaw in IBM's Aspera Faspex software.
Starting with Chrome version 111, the Chrome Cleanup Tool will be turned off for Windows users due to a decline in user complaints about unwanted software and improved defenses against malware.
A piece of cryptojacking malware was recently found hiding in pirated versions of Apple programs, such as Final Cut Pro and Logic Pro X. The malware can easily avoid detection through a script.
Fruits and vegetables company Dole recently suffered a ransomware attack that forced it to shut down its production plants. The company is working with experts to remediate the issue.
Threat actors were recently seen advertising fake ChatGPT apps for Windows and Android. When downloaded, the apps will steal sensitive information or subscribe the victim to premium services.
A botnet called "Mylobot" is infecting over 50,000 devices daily, according to a recent report. Mylobot can download more malware, send spam emails, and even remain idle to avoid detection.
An information-stealing malware called "Stealc" was recently seen being advertised to other cybercriminals on the dark web. It can also be contracted through fake software crack websites.
The threat actors behind a ransomware strain called "HardBit" were recently seen asking victims to provide them with their insurance details. This is so they can tailor their demand within the policy.
Pepsi Bottling Ventures has suffered a data breach as a result of an unknown party installing information-stealing malware on its internal systems. The breach occurred as early as December 23, 2022.
Security practitioners have been giving all sorts of advice for decades about how to avoid getting your resources infected from downloads. But how clear and how relevant is that messaging today?
A ransomware strain that exploits a legitimate Windows search tool has recently been discovered by security researchers. The new variant can disable Windows Defender and even prevent shutdowns.
Because Microsoft has now blocked macros by default on Office files, cybercriminals are now using digital note-taking app OneNote to victimize people and infect their devices with malware.
A new Pokémon-themed malware campaign has been discovered online. While it disguises itself as a trading card game where players can earn NFTs, it actually downloads a remote access tool.
Python developers who spent some time coding over the holiday break may want to check out an advisory regarding a malicious PyTorch package that was being fetched from PyPI last week.
AV-TEST has shared interesting data regarding malware growth in 2022. The data consists of numbers for Windows, macOS, Linux, and Android. Overall, Windows sees the biggest malware count by far.
A malware campaign is using fraudulent loan apps to trick unsuspecting users into giving out their private information. The apps have amassed over 100,000 downloads from unofficial app stores.
An Android threat campaign using fraudulent educational apps was recently found. It can capture various Facebook information such as profile name, email address, password, and phone number.
Be careful before you install that TikTok "unfiltering" software — it might be loaded with malware that can steal your passwords, Discord accounts, cryptocurrency wallets, and credit card data.
A report by Elastic Security Labs found that 6.2% of malware ends up on macOS devices. However, almost 50% of this malware come from one source, a utility software suite called MacKeeper.
A newly discovered ransomware strain is framing cybersecurity experts by claiming that they are the ones behind the attacks. However, the people blamed are not associated in any way with the malware.
A typosquatting campaign that steals sensitive data and infects Android and Windows devices with malware has recently been discovered. Many of the fake domains look very similar to the real ones.
Meta has warned one million Facebook users who may have had their accounts compromised through a fraudulent iOS or Android app. The apps required users to sign in in order for the app to "work."
A new strain of Android malware that can steal information and eavesdrop on chats has been discovered. The malware is installed on a user's device if they install a fake phone number spoofing app.
Anti-malware vendor Bitdefender has discovered that Microsoft OneDrive is being used by crypto-jackers to mine cryptocurrency. The threat actors are using the DLL hijacking method to do so.
Microsoft is switching on tamper protection for all existing customers of Microsoft Defender for Endpoint. It comes after the company enabled the feature for new customers last year.
Microsoft Edge has been found to be serving malicious tech support scam ads. While the ads appear harmless from a distance, they are designed to redirect targets to malicious domains.
HP has warned that it has discovered a new high severity privilege escalation vulnerability inside its own Support Assistant software utility. The company has also issued a fix for the security flaw.
Avast has launched the Ransomware Shield for business users. It protects files and folders from being edited by unauthorized programs, which should protect them from ransomware programs.
The UK's Competition and Markets Authority has provisionally given the go ahead of the acquisition of Avast by NortonLifeLock. It said the merger won't give the firm a monopoly position.
Microsoft's Threat Intelligence Center (MSTIC) claims it caught an Austrian company selling spyware called Subzero. The malware relied on zero-day vulnerabilities, which have been patched.