News
-
"Attackers Have 'Favorite' Vulnerabilities to Exploit"According to researchers from Palo Alto Networks, attackers play favorites when looking at which software vulnerabilities to target. The researchers stated that nearly one in three, or 31%, of incidents analyzed by Unit 42 in its 2022 "Incident…
-
"Credential Stealer Malware Raccoon Updated to Obtain Passwords More Efficiently"Security experts at Zscaler have analyzed the new variant of the known Raccoon Stealer malware. The researchers stated that the latest version of the malware is written in C, unlike previous versions, which were mainly written in C++. Raccoon…
-
"Blockchain Security Firm Warns of New MetaMask Phishing Campaign"Halborn, a blockchain security firm, has issued an alert regarding a new phishing campaign targeting MetaMask cryptocurrency wallet users. The active phishing campaign, according to a post by Halborn's technical education specialist Luis Lubeck, used…
-
"White House Official: EPA to Issue Cybersecurity Rule for Water Facilities"According to a key White House official, the Environmental Protection Agency (EPA) will soon include cybersecurity in sanitation reviews of the nation's critical water facilities under a new rule. Because of EPA's "limited" authorities, White House…
-
"Giant Investment Scam Network Targets Victims with Phone Calls"Security researchers at Group-IB have uncovered a massive investment fraud campaign targeting European victims via online and phone channels. The researchers stated that the "gigantic network infrastructure" covers over 10,000 rogue websites…
-
"Facebook Ads Promoted Apps with HiddenAds Malware, Affects 1M+ Users"McAfee's Mobile Research Team discovered HiddenAds malware in apps distributed via the Google Play Store. One app masquerades as a system cleaner to delete junk files on devices. Another HiddenAds-laced app claims to help optimize battery life for device…
-
"CISA Warns of Critical Confluence Bug Exploited in Attacks"US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Confluence vulnerability, tracked as CVE-2022-26138, to its list of exploited bugs. This flaw can provide remote attackers with hardcoded…
-
"Countdown Clock Puts Pressure on Phishing Targets"Security researchers at Cofense warn of a new phishing campaign that tries to hurry users into making poor decisions by presenting them with a countdown clock. The researchers spotted the credential harvesting campaign, which arrives in the form of…
-
"Healthcare Data Breaches Cost an Average of $10.1M, More than Any Other Industry"A data breach in the healthcare industry costs the most, on average, $10.1 million. According to the annual IBM Cost of a Data Breach Report, the industry has faced the highest average cost of a breach over the last 12 years. In comparison, the average…
-
"Australian Man Charged for Developing Imminent Monitor RAT"The Australian Federal Police recently announced that a 24-year-old man has been charged for allegedly creating and selling a piece of spyware named Imminent Monitor (IM). The suspect, who has not been named, is said to have created the remote access…
-
"Ransomware Gangs Are Hitting Roadblocks, but Aren't Stopping (Yet)"According to SonicWall's mid-year 2022 Cyber Threat Report, there has been a global 23 percent drop in ransomware, as geopolitical forces, volatile cryptocurrency prices, and increased government and law-enforcement focus influenced who cybercriminals…
-
"Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers"The Gootkit Access-as-a-Service (AaaS) malware's operators have reemerged with updated techniques to compromise unsuspecting victims. Gootkit previously used freeware installers to disguise malicious files. According to Trend Micro researchers, it now…