Skip to content

Malware

Security and Technology news from various third party sources. All attribution remains the property of the original authors

351 Topics 351 Posts
  • 0 Votes
    1 Posts
    42 Views
    CerberusC

    Cruddy cryptography means victims whose files have been encrypted by the Ukraine-tormenting ransomware can break the chains without paying extortionists.

    https://threatpost.com/free-hermeticransom-ransomware-decryptor-released/178762/

  • 0 Votes
    1 Posts
    38 Views
    CerberusC

    A military email address was used to distribute malicious email macros among EU personnel helping Ukrainians.

    https://threatpost.com/phishing-campaign-targeted-those-aiding-ukraine-refugees/178752/

  • 0 Votes
    1 Posts
    44 Views
    CerberusC

    It’s not just Ukraine: There’s a flood of intel on Russian military, nukes and crooks, says dark-web intel expert Vinny Troia, even with the Conti ransomware gang shuttering its leaking Jabber chat server.

    https://threatpost.com/russia-leaks-data-thousand-cuts-podcast/178749/

  • 0 Votes
    1 Posts
    34 Views
    CerberusC

    Malicious Google Play apps have circumvented censorship by hiding trojans in software updates.

    https://threatpost.com/teabot-trojan-haunts-google-play-store/178738/

  • 0 Votes
    1 Posts
    39 Views
    CerberusC

    The decryptor spilled by ContiLeaks won’t work with recent victims. Conti couldn’t care less: It’s still operating just fine. Still, the dump is a bouquet’s worth of intel.

    https://threatpost.com/conti-ransomware-decryptor-trickbot-source-code-leaked/178727/

  • 0 Votes
    1 Posts
    46 Views
    CerberusC

    Via node-hopping, the espionage tool can reach computers that aren’t even connected to the internet.

    https://threatpost.com/daxin-espionage-backdoor-chinese-malware/178706/

  • 0 Votes
    1 Posts
    34 Views
    CerberusC

    Microsoft detected cyberattacks launched against Ukraine hours before Russia’s tanks and missiles began to pummel the country last week.

    https://threatpost.com/microsoft-ukraine-foxblade-trojan-hours-before-russian-invasion/178702/

  • 0 Votes
    1 Posts
    41 Views
    CerberusC

    A pro-Ukraine Conti member spilled 13 months of the ransomware group’s chats, while cyber actors are rushing to align with both sides.

    https://threatpost.com/ukraine-russia-cyber-warzone-splits-cyber-underground/178693/

  • 0 Votes
    1 Posts
    36 Views
    CerberusC

    The infamous trojan is likely making some major operational changes, researchers believe.

    https://threatpost.com/trickbot-break-researchers-scratching-heads/178678/

  • 0 Votes
    1 Posts
    53 Views
    CerberusC

    The ransomware gang known as Cuba is increasingly shifting to exploiting Exchange bugs – including crooks’ favorites, ProxyShell and ProxyLogon – as initial infection vectors.

    https://threatpost.com/microsoft-exchange-exploited-cuba-ransomware/178665/

  • 0 Votes
    1 Posts
    41 Views
    CerberusC

    Ransomware is getting worse, but Daniel Spicer, chief security officer at Ivanti, offers a checklist for choosing defense solutions to meet the challenge.

    https://threatpost.com/latest-insights-ransomware-threats/178391/

  • 0 Votes
    1 Posts
    35 Views
    CerberusC

    The options reportedly included tampering with trains, electric service and internet connectivity, hampering Russia’s military operations in Ukraine.

    https://threatpost.com/white-house-denies-mulling-massive-cyberattacks-against-russia/178658/

  • 0 Votes
    1 Posts
    35 Views
    CerberusC

    Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout.

    https://threatpost.com/harsh-truths-cybersecurity-part-two/178447/

  • 0 Votes
    1 Posts
    38 Views
    CerberusC

    The SEO poisoning bot, capable of full system takeover, is actively taking over social media accounts, masquerading as popular games like Temple Run.

    https://threatpost.com/microsoft-app-store-electron-bot-malware/178629/

  • 0 Votes
    1 Posts
    28 Views
    CerberusC

    Demand for public Wi-Fi is on the rise. Usually free of charge, but there is a risk of expensive losses. Learn ways to protect yourself from cyber-threats.

    https://threatpost.com/web-filtering-and-compliances-for-wi-fi-providers/178532/

  • 0 Votes
    1 Posts
    34 Views
    CerberusC

    With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.

    https://threatpost.com/the-art-of-non-boring-cybersec-training-podcast/178594/

  • Sextortion Rears Its Ugly Head Again

    1
    0 Votes
    1 Posts
    38 Views
    CerberusC

    Attackers are sending email blasts with malware links in embedded PDFs as a way to evade email filters, lying about having fictional “video evidence.”

    https://threatpost.com/sextortion-rears-its-ugly-head-again/178595/

  • 0 Votes
    1 Posts
    36 Views
    CerberusC

    Nothing like zombie campaigns: WannaCry’s old as dirt, and GandCrab threw in the towel years ago. They’re on auto-pilot at this point, researchers say.

    https://threatpost.com/wannacry-gandcrab-top-ransomware-scene/178589/

  • 0 Votes
    1 Posts
    38 Views
    CerberusC

    The overall number of attacks on mobile users is down, but they’re getting slicker, both in terms of malware functionality and vectors, researchers say.

    https://threatpost.com/gaming-banking-trojans-mobile-malware/178571/

  • 0 Votes
    1 Posts
    44 Views
    CerberusC

    The Conti gang breached the cookware giant’s network, prepping thousands of employees’ personal data for consumption by cybercrooks.

    https://threatpost.com/cyberattackers-employee-personal-data-meyer/178570/