latest cyber security news
-
Threats
Forced Chrome extensions get removed, keep reappearing
Malwarebytes found a family of forced Chrome extensions that can’t be removed because of a policy change that tells users…
-
Threats
ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
A review of what’s changed in malware in 2022, and what hasn’t, based on Adam Kujawa’s talk at RSAC 2022.…
-
Threats
Credential-stealing malware disguises itself as Telegram, targets social media users
Spyware.FFDroider is an information stealer that exfiltrates browser data in an attempt to steal credentials and valid session cookies. A…
-
Threats
Don’t let scammers ruin your Valentine’s Day
No matter the occasion, you can always count on scammers to show up. Today is Valentine’s Day, so we thought…
-
Threats
SolarWinds attackers launch new campaign
The Microsoft Threat Intelligence Center has issued a warning about new activities from Nobelium, the group behind SolarWinds, Sunburst, and…
-
Threats
Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
Threat Research Blog Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise June 16, 2021 | by Tyler McLellan, Robert…
-
Threats
The UNC2529 Triple Double: A Trifecta Phishing Campaign
In December 2020, Mandiant observed a widespread, global phishing campaign targeting numerous organizations across an array of industries. Mandiant tracks…
-
Malware Analysis
Rare UEFI Malware Found in the wild Kaspersky says
By Mark Lechtik, Igor Kuznetsov, Yury Parshin Part II. Technical details (PDF) UEFI (or Unified Extensible Firmware Interface) has become a prominent technology…
-
Threats
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
Mandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being…
-
Threats
Abusing Replication: Stealing AD FS Secrets Over the Network
Organizations are increasingly adopting cloud-based services such as Microsoft 365 to host applications and data. Sophisticated threat actors are catching…
- 1
- 2