Items tagged with Malware
Microsoft has sounded the alarm on a pervasive piece of malware that has already infected hundreds of thousands of PCs. A few weeks ago, we reported on the Clop gang's involvement in the large-scale data leaks at Hertz. This time, Microsoft reports that the Lumma info stealer created by the notorious Russian malware...
Read more...
In a disturbing revelation that highlights the evolving nature of cyber threats, a YouTuber uncovered a significant security lapse where a printer manufacturer inadvertently distributed malware-laced software to its customers for at least six months. The drivers, which were hosted on popular file hosting site Mega.nz...
Read more...
Modern AI is far from science-fiction AGI, and yet it can still be an incredibly powerful tool. Like any tool, if misused, it can pose a threat to legitimate users, like how we recently covered photographers' concerns that Google's Gemini Flash 2.0 could be used to easily remove watermarks from copyrighted...
Read more...
A few weeks ago, we reported a study alleging that CAPTCHA does not deter bots and that Google merely uses it to collect and sell data. This week, HP Wolf Security researchers have launched a new complaint against CAPTCHA in the latest edition of the HP Threat Insights Report. This time, however, the complaint has...
Read more...
You probably have experienced situations where you needed to convert files from one format to another. In these cases, free online file converters are a common solution. However, the FBI Denver Field Office has just taken to X (formerly Twitter) to warn users that threat actors now use these seemingly harmless online...
Read more...
Microsoft has uncovered a large-scale malvertising campaign that has affected over 1 million devices worldwide. In a blog post detailing its findings, Microsoft revealed that threat actors used platforms such as Dropbox, Discord, and Github to broadcast malware. The attacks, which were aimed at stealing sensitive...
Read more...
Imagine you're having a good time enjoying your favorite TV show, and suddenly an adult video takes over your screen, your remote stops working and harmful content is being forced on viewers. While you might dismiss this as mere fantasy, there are reports that incidents just like this have occurred as a result of the...
Read more...
Are you using or planning to use a phone monitoring and tracking spyware application? If yes, you need to be aware of a new malware in the wild that compromises smartphones through a specific group of phone monitoring applications. The latest software listed among the most vulnerable apps is Spyzie. Researchers have...
Read more...
Discovered in 2020, the XCSSET malware gained notoriety for granting cybercriminals remote access to developers' MacBooks. While this discovery led to improved macOS protection strategies, Microsoft Threat Intelligence has recently identified a new, more sophisticated XCSSET variant targeting macOS.
Malicious...
Read more...
Phishing attacks continue to surge, with estimates indicating over 800,000 victims in the first quarter of 2024, a 4% rise from the same period the previous year. Attackers persistently try to deceive individuals into revealing their credentials. While Two-Factor Authentication (2FA) is commonly used as a defense...
Read more...
Malware on iPhones and Android devices is often associated with downloading third-party apps from unofficial sources. Cybercriminals, however, are also able to hide malware within apps found at official sources, like the iOS App Store and Google Play Store. These pieces of malware are often designed to target...
Read more...
Many people believe MacBooks are impervious to malware. While strong security measures such as Xprotect, Gatekeeper, and Sandboxing are in place on macOS, they do not offer foolproof protection. Case in point: Cyber security tech giant Check Point has issued an urgent security warning to millions of Mac users...
Read more...
Beware of those Google Calendar invites as they could lead to a world of hurt if you accept them haphazardly. Security researchers at Check Point warn that cyber criminals are exploiting user-friendly features in Google Calendar to try and trick potential victims into clicking on malicious links, and that they've...
Read more...
Security researchers at Any.Run have found a new zero-day attack currently being used by threat actors to evade detection tools used by security professionals. This new technique “evades antivirus software, prevents uploads to sandboxes, and bypasses Outlook's spam filters, allowing the malicious emails to reach your...
Read more...
Security researchers at Kaspersky have discovered malware, dubbed SteelFox, which has been spreading “via forums posts, torrent trackers and blogs” since February of last year. It’s a potent piece of malicious software that attackers can use to extract a whole host of data from a victim’s computer, and can even enable...
Read more...
In what feels like a serious case of déjà vu, a piece of Android malware initially discovered two years ago, and spotted this time by cybersecurity firm Zimperium, is making the rounds again with a new version sporting several alarming advancements. While the malicious app has a new coat of paint, the aim is still the...
Read more...
In what feels like déjà vu, a particular piece of Android malware has managed to sneak its way back into apps available in the Google Play Store after initially being discovered in 2019. The security research team at Kaspersky shared that the "Necro" trojan was found within several popular apps that, according to...
Read more...
Security researchers at McAfee have discovered new malware targeting Android users, named SpyAgent. The main aim of this malicious software being the theft of seed phrases that can be used to recover cryptocurrency wallets. Although once installed on a device threat actors using SpyAgent will also look to exfiltrate...
Read more...
The United States Secret Service and United States Department of State are on the hunt for Belarusian national Volodymyr Iuriyovych Kadariya, who is wanted in connection with cybercrimes pertaining to the Angler Exploit Kit, and the agencies are willing to pay a massive reward for help in tracking him down. How...
Read more...
Researchers at Cado Security have found new malware targeting maOS users, which is dubbed “Cthulhu Stealer.” The malicious app attempts to deceiver users by masquerading as legitimate software, such as CleanMyMac, Grand Theft Auto IV, and Adobe GenP. It’s incredibly similar to Atomic Stealer, malware first released in...
Read more...
Security researchers at Cisco Talos have discovered a set of vulnerabilities affecting macOS users who have Microsoft applications installed on their computers, providing more attack vectors for malicious actors. The researchers say that “an attacker could bypass the operating system’s permission model by using...
Read more...
More malware targeting Mac users has been found by searchers at security firm Elastic Security Labs. The malicious software has been dubbed “Banshee Stealer,” and it is able to compromise systems using either Intel or Apple Silicon chips. The researchers says that “this malware presents a severe risk to macOS users...
Read more...