52% of organizations experienced a malware incident on remote devices in 2020, up from 37% in 2019, a Wandera report reveals. Of devices compromised by malware...
Attackers are using the normally harmless Windows Finger command to download and install a malicious backdoor on victims’ devices. The ‘Finger’ command is a utility that...
A pioneering malware vulnerability database has become a surprise addition to security pros’ defensive toolkits as they seek to disrupt, remediate, or attribute cyber-attacks. Launched on...
Recently Intezer researchers discovered a new and self-spreading Golang-based malware that continues the popular 2020 trend of multi-platform malware. This new crypto-mining malware exploits known vulnerabilities...
Cybersecurity researchers today revealed a wide-ranging scam targeting cryptocurrency users that began as early as January last year to distribute trojanized applications to install a previously...
CISA flags ‘further hardening’ advice as Microsoft reveals internal account compromises The extent and impact of the SolarWinds hack became even more apparent – and terrifying...
Cybersecurity is an arms race, with defensive tools and training pushing threat actors to adopt even more sophisticated and evasive intrusion techniques as they attempt to...
Open-source software repositories form the backbone of many software development projects. But, what if they are used for planting malicious intents? Over the past few years,...
The internal networks of Lithuania’s National Center for Public Health (NVSC) and several municipalities have been infected with Emotet malware following a large campaign targeting the...
REvil ransomware gang, aka Sodinokibi, hacked The Hospital Group and threatens to release before-and-after pictures of celebrity clients. The Hospital Group has 11 clinics and has...
Recent Comments