Malware

Malware spread via LinkedIn and EV Charging Stations prone to Quishing Attacks

LinkedIn Used by Scammers to Distribute Malware: A New Threat LinkedIn, a leading platform for professional networking, is now being exploited by scammers to spread a malware known as Covertcatch. Mandiant, a security firm owned by Google, has uncovered that North Korean hackers are using LinkedIn to target individuals with fake job offers, leading them […]

Malware induction into Windows and MacOS devices via ISP

Volexity, a cutting-edge cybersecurity firm based in Virginia, has uncovered a Chinese hacking group known as StormBamboo, which is injecting malware into software updates distributed through an Internet Service Provider (ISP). The name of the ISP has been kept confidential. According to reports, StormBamboo—also identified as Evasive Panda, Daggerfly, or Storm Cloud—has been active since […]

Android Mobile Security alert against SMS Stealer Malware

A new type of malware, known as SMS Stealer, is making waves in the cybersecurity world. Designed to harvest one-time passwords (OTPs) and other sensitive information, this malware has already targeted over 600 global brands, according to experts from Zimperium. Zimperium reports that SMS Stealer is spreading rapidly and affecting businesses in more than 113 […]

Infinidat Revolutionizes Enterprise Cyber Storage Protection to Reduce Ransomware and Malware Threat Windows

Infinidat, a leading provider of enterprise storage solutions, has introduced a new automated cyber resiliency and recovery solution that will revolutionize how enterprises can minimize the impact of ransomware and malware attacks. Infinidat’s InfiniSafe® Automated Cyber Protection (ACP) is a first-of-its-kind cybersecurity integration solution that is designed to reduce the threat window of cyberattacks, such […]

How to Analyze Malware in 5 Steps

Trojans, ransomware, spyware, and other types of malware are significant threats to organizations. To stay informed and understand how the latest malware operates, cybersecurity professionals need to be able to analyze it. Here are five steps that security specialists can take to dissect malicious software and expose its functionality. Step 1: Isolate the Malware The […]

How to ensure the security of your SaaS platform

Distributing cloud solutions and services via a proprietary SaaS platform can be a highly profitable business model. Vendors of successful platforms can earn hundreds of millions of dollars annually, following the examples of Datadog, Hubspot, Salesforce, and other SaaS market players. However, when developing a SaaS platform, vendors have to ensure the security of data […]

Eurojust conducts operation to shut malware and ransomware spreading botnets

Eurojust, the European Union Agency for Criminal Justice, recently initiated a decisive strike against a notorious botnet network responsible for disseminating malware and ransomware across the digital realm. Dubbed “Endgame,” this operation was meticulously coordinated with law enforcement agencies worldwide, resulting in the apprehension of four key suspects. The crackdown led to the seizure of […]

ATM malware developed to target Europe

Britain’s NCSC, the cybersecurity arm of GCHQ, has taken heed of a recent alert regarding a concerning cyber threat. According to reports from media outlets, criminals have developed malware specifically targeting ATMs, with the potential to generate a minimum profit of $30,000 per infected machine. This malicious software, currently attributed to a known cybercrime actor, […]

Fake Antivirus websites now delivering malware

In recent times, the landscape of cyber threats has taken a new turn, with cybercriminals employing sophisticated tactics to disseminate malware through counterfeit antivirus websites. This revelation comes from researchers at Trellix, shedding light on a concerning trend where malicious actors not only aim to pilfer sensitive data but also engage in double or triple […]

How do cybercriminals use artificial intelligence?

The world is becoming increasingly digital, and innovative technological advancements such as artificial intelligence (AI) are evolving at an alarming rate. But unfortunately, as technology advances, so do the strategies of cybercriminals. The integration of AI into nefarious online activities has sparked a cascade of newly sophisticated cyber threats which both individuals and businesses alike […]

Share this page