Lojax, the new threat developed by Fancy Bear
Relevant information on the most recent threat of this dangerous hacking group Recently, the findings of digital forensics specialists have been published on a new cyberattack campaign launched by the...
View ArticleCryptomining software is hidden as Flash update
A cryptocurrency mining malware is disguised as a Flash update that appears to be legitimate, warn researchers Cryptomining popularity exploded in 2017 when Ethereum’s value soared to unsuspected...
View ArticleThe biggest CCTV manufacturer left at least 9 million devices opened to...
The cloud portal of Xiongmai left opened a backdoor to its servers Another Internet of Things (IoT) device provider has been discovered exposing its products to malicious users due to basic security...
View ArticleHackers use Googlebot in mining malware attacks
Cybercriminals abuse Googlebot servers to deliver malicious payloads in new campaign Last year, a malware campaign used Google Adwords and Google Sites to spread malware. Later, another research...
View ArticleNotPetya linked to the Industroyer attack against energy infrastructure in...
Three of the most destructive incidents seen in modern cybersecurity are the work of the same APT The Last year occurred the massive outbreak of NotPetya ransomware, which crippled the operations of...
View ArticleLuminosityLink tool creator sentenced to 30 months in prison
The tool allowed access to the victims’ computers without their consent A 21-year-old man living in Kentucky, who had previously plead himself guilty of developing, marketing and selling a popular...
View ArticleWest Haven pays $2k USD because of ransomware attack
According to experts, many municipalities attacked with ransomware do not have many options when facing such an incident The city of West Haven, Connecticut, made the difficult decision to pay a...
View ArticleDecrypt files attacked with the latest versions of GandCrab ransomware
Recover your encrypted files with this free tool A tool recently launched by experts in cybersecurity and digital forensics allows you to recover files encrypted by some versions of GandCrab, a...
View ArticleMalicious hackers and their interest in bypassing CAPTCHA
Hackers are looking for ways to bypass this security measure The topic is being discussed in multiple hacking forums hosted on deep and dark web. Threat actors have shown special interest in...
View ArticleGovernment employee who used to watch porn at work alleged guilty of...
The employee infected a government network, in addition to some devices Cybersecurity and digital forensics researchers found that a US government network had been infected with malware by a civil...
View ArticleSearch for “Installing Chrome” on Bing can lead to malicious content
At this point, the process of installing the most used browser in the world remains risky A Twitter user was directed by Bing (the default search engine used by Microsoft Edge on Windows 10) to a fake...
View ArticleResearchers reveal the malware used by North Korean hackers to attack ATMs
The Lazarus hackers have been using the FastCash Trojan on obsolete AIX servers to steal tens of millions of dollars The researchers of the information security and digital forensics firm Symantec...
View ArticleCourt attributes John McAfee ‘liability’ for the death of a neighbor
The entrepreneur has always been involved in controversy John McAfee, an information security community personality, has been found legally ‘liable’ for the death of his neighbor, who was found dead...
View ArticleMalaysia’s largest media company becomes victim of a ransomware attack
The hackers have demanded a ransom of $6.45M USD Media Prima Berhad, Malaysia’s leading media company, has been attacked by a ransomware campaign in which the attackers demanded the company to make a...
View ArticleOver 500k Play Store users have installed 13 games that contain malware
The malicious program could be a cryptocurrency miner, or an adware The Android mobile operating system is one of the most widely used in the world, so multiple threat actors see it as a potentially...
View ArticleLinux mining software could steal passwords and disable antivirus
The trojan also installs a rootkit and another malware variant that can lead to denial-of-service conditions Perhaps the malware variants that affect Linux users are not as common as threats to...
View ArticleThe FBI shuts down a millionaire online fraud campaign
Cybercriminals behind this operation earned about $30M USD The Federal Bureau of Investigation (FBI), Google and multiple cybersecurity and digital forensics firms worked together to collapse one of...
View ArticleCryptomining software is hidden as Flash update
A cryptocurrency mining malware is disguised as a Flash update that appears to be legitimate, warn researchers Cryptomining popularity exploded in 2017 when Ethereum’s value soared to unsuspected...
View ArticleThe biggest CCTV manufacturer left at least 9 million devices opened to...
The cloud portal of Xiongmai left opened a backdoor to its servers Another Internet of Things (IoT) device provider has been discovered exposing its products to malicious users due to basic security...
View ArticleThousands of PCs infected with new ransomware variant in China
A new malware variant has been discovered in China; this malicious program has infected over 100k devices in less than a week Digital forensics specialists from the International Institute of Cyber...
View Article