21.2 C
London
Wednesday, April 8, 2020
Though Russia still has an undiversified and stagnant economy, it was one of the early countries in the world to realize the value of remotely conducted cyber intrusions. In recent years, many Russia hacking groups have emerged as one of the most sophisticated nation-state...
It's been a summer of ransomware hold-ups, supply chain attacks and fileless attacks flying under the radar of old-school security. With malware running amok while we were lying on the beach, here's a recap of the most burning strains and trends seen in the wild during the...
THIS WEEK IN THE IRONIC NEWS: DDS Safe, an online cloud-based data backup system that hundreds of dental practice offices across the United States are using to safeguard medical records and other information of their patients from ransomware attacks has been hit with ransomware.
The French law enforcement agency, National Gendarmerie, today announced the successful takedown of one of the largest wide-spread RETADUP botnet malware and how it remotely disinfected more than 850,000 computers worldwide with the help of researchers. Earlier this year, security researchers at Avast antivirus firm, who were actively...
The malware is believed to have been created by US and Israeli intelligence agencies.Stuxnet is designed to alter Programmable Logic Controllers (PLCs) used in the types of industrial control systems (ICS). The Stuxnet malware has made a powerful comeback after a hiatus of eight...
Quasar Remote Access Trojan uses two methods to achieve persistence such as scheduled tasks and registry keys.Its capabilities include capturing screenshots, recording webcam, reversing proxy, editing registry, spying on the user’s actions, keylogging and stealing passwords. Quasar is a publicly available open-source Remote Access...
Some hackers use malicious code, but most just hide in plain sight. It can be devastatingly effective When their computer or social media account is hijacked by an unknown entity, most people probably picture something like this: a faceless man hunched over a...
It's an art piece containing six pieces of malware responsible for $95 billion worth of damage, and it just sold at auction for $1.345 million. Nobody would deliberately install malware on a laptop they intend to use, but doing so in the name...
Real VPN client comes bundled with banking Trojan Criminals are cloning the website of popular VPN software to try and trick users into downloading malware. According to new research, the cybercriminals responsible for breaching and utilizing the website of the free video editor VSDC to...
Emotet is now one of the top threats, its infrastructure being used to distribute Trickbot, another banking trojan, and then spread the Ryuk ransomware. This combination is dubbed 'triple threat' and has affected public administrations in the U.S. Researchers noticed that Emotet operators took...
Cyber-Security is much more than a matter of IT
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it