New MajikPOS Malware targets users in across North America and Canada
Trend Micro has discovered a new PoS malware, tracked as MajikPOS, that is targeting business in North America and Canada. Security experts at Trend Micro have discovered a new PoS malware, tracked as...
View ArticlePwn2Own 2017: Experts Hack Edge, Safari, Ubuntu
Bug bounty hunters have managed to hack Microsoft Edge, Safari, Ubuntu and Adobe Reader on the first day of the Pwn2Own 2017 competition taking place these days alongside the CanSecWest conference in...
View ArticleRansomware operators are hiding malware deeper in installer packages
We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective move by attackers to once again dodge AV detection by...
View ArticleFormer IT Admin Accused of Leaving Backdoor Account, Accessing It 700+ Times
In another classic example of why you shouldn’t leaving your work laptop in the car, national security may have been compromised. An Oregon sportswear company is suing its former IT administrator,...
View ArticleNew (but Old) Technique Hijacks User Sessions on All Windows Versions
A security researcher has detailed a way to log into any account on the same computer, even without knowing its password. The trick works on all Windows versions, doesn’t require special privileges,...
View ArticleAttackers Leverage Excel, PowerShell and DNS in Latest Non-Malware Attack
Increasingly, cyberattackers have been leveraging “non-malware” attack methods to target vulnerable organizations. Recently, the Carbon Black Threat Research Team was alerted about such an attack by a...
View ArticleBig Surprise: Chinese PUPs Deliver Backdoored Drivers
A driver secretly installed via PUPs packages for Chinese software contain backdoors enabling a third-party to load unsigned drivers or to execute code with higher privileges on a Windows machine. The...
View ArticleThe Polski-Vortex-Flotera Ransomware Connection
A malware author that loves Polish hip hop music appears to be behind the Polski, Vortex, and Flotera (spelled Ŧl๏tєгค) ransomware families that have made a small number of victims between January and...
View ArticleHackers: We Will Remotely Wipe iPhones Unless Apple Pays Ransom
“I just want my money,” one of the hackers said. A hacker or group of hackers is apparently trying to extort Apple over alleged access to a large cache of iCloud and other Apple email accounts. The...
View ArticleNew Attack Uses Microsoft’s Application Verifier to Hijack Antivirus Software
A new technique named DoubleAgent, discovered by security researchers from Cybellum, allows an attacker to hijack security products and make them take malicious actions. The DoubleAgent attack was...
View ArticleNew LLTP Ransomware Appears to be a Rewritten Venus Locker
A new ransomware was discovered today by MalwareHunterTeam called LLTP Ransomware or LLTP Locker that is targeting Spanish speaking victims. On a closer look, this ransomware appears to be a rewritten...
View ArticleChinese Crooks Use Fake Cellular Telephony Towers to Spread Android Malware
Malware authors in China are using fake base transceiver stations (BTSs), which is equipment usually installed on cellular telephone towers, to send spoofed SMS messages that contain links to Android...
View ArticleLastPass Bugs Allow Malicious Websites to Steal Passwords
LastPass says it patched one of two separate bugs that affected its Chrome and Firefox browser extensions, which if exploited, would have allowed a third-party to extract passwords from users visiting...
View ArticleMost Industrial Control Systems Get Infected with Malware by Accident
The vast majority of malware incidents that take place at industrial facilities around the world are just accidental infections, albeit a very small number of targeted attacks have also been detected....
View ArticleMalvertising Campaign on Adult Sites Spreads Ramnit Trojan
Security researchers from Malwarebytes have discovered a new malvertising campaign targeting visitors of several adult websites, spreading the Ramnit trojan and focusing on users from Canada and the...
View ArticleWord Document Spreads Macro Malware Targeting Both Windows and macOS
After last month security researchers discovered the first-ever Word document spreading macro malware on macOS, last week, researchers from Fortinet spotted a Word document that contained macro...
View ArticleSpear phishing campaign targeted Saudi Arabia Government organizations
Security researchers at MalwareBytes have uncovered a spearphishing campaign that targeted Saudi Arabia Government organizations. Security experts at MalwareBytes have spotted a new spear phishing...
View ArticleBritish Authorities Slam WhatsApp for Encryption Used by London Terrorist
The Brits join US intelligence agencies who’d want a backdoor into the encryption feature on all services. End-to-end encryption services like WhatsApp are once more being slammed for offering...
View ArticleAdware Replaces Phone Numbers for Security Firms Returned in Search Results
A new adware family named Crusader will rewrite tech support phone numbers returned in Google search results, display ads, and show popups pushing tech support scams. Current versions of Crusaders are...
View ArticlePyCL Ransomware Delivered via RIG EK in Distribution Test
This past Saturday security researchers Kafeine, MalwareHunterteam, BroadAnalysis, and David Martínez discovered a new ransomware being distributed through EITest into the RIG exploit kit. As this...
View Article