In a recent ransomware report, Trend Micro found that ransomware groups used fake applications to target individuals during the COVID-19 pandemic. The “Attacks from All Angles: 2021...
Today’s attackers are looking for multi-million-dollar payouts and use increasingly sophisticated methods to achieve their goals. In a world where the types of attacks organizations face...
A new malware has been discovered that is an all-inclusive package for a keylogger, cryptocurrency stealer, and document uploader. Named BluStealer, it was first spotted by...
A new Mac malware, named ZuRu, has been detected spreading via poisoned search engine results in China via Baidu. The criminals masquerade as iTerm2, which is...
Cloud apps are now the most common way digital attackers distribute malware. In the second quarter of 2021, researchers found that 68% of malware downloads originated...
After news of REvil’s rip-off-the-affiliates backdoor & double chats, affiliates fumed, reiterating prior claims against the gang in “Hackers Court.” A day after news broke about...
Google researchers spotted malware developers creating malformed code signatures seen as valid in Windows to bypass security software. This tactic is actively used to push OpenSUpdater,...
Despite the cliche image of the hooded hacker ensconced in an underground base, furiously breaking through firewalls and other digital security mechanisms, the reality of cybercrime...
During the height of the COVID-19 pandemic, nearly 70% of full-time employees in the United States transitioned to working from home. As we venture into the post-COVID world,...
Recently, the PYSA ransomware gang expanded its attack portfolio by adding support to Linux-based systems. Experts noted a Linux version of ChaChi on VirusTotal. ChaChi is...
Recent Comments