Major DDoS Cyberattack Dismissed As T-Mobile Misconfiguration
Security experts say there is no evidence the U.S. was hit by a major DDoS cyberattack this week—despite rampant social media speculation.
Yesterday, rumors circulated on Twitter after telecom operators, games, social networks, banks and...
APT Gamaredon Using New Hacking Tools For Microsoft Outlook, Excel & Office
Gamaredon Hackers Using New Tools for Microsoft Outlook, Office, and Excel
A Russia-linked APT group named Gamaredon (aka Primitive Bear) has been using several undocumented post-compromise tools in various malicious...
New Malware Poisons NetBean Java Projects Github Warns
GitHub has issued a security alert on Thursday warning about a new malware strain that's been spreading on its site via boobytrapped Java projects.
The malware, which GitHub's security team...
Covid-19 Researchers Targeted By Chinese Hackers
The CISA & FBI Issue a Join Warning to COVID Researchers
The FBI and the U.S. Cybersecurity and Infrastructure Security Agency issued a warning Wednesday that hacking groups linked to China's government...
New Info Stealer Poulight From The Russian Underground
Poulight Stealer, a new Comprehensive Data Stealer from Russia
Introduction
Nowadays, info-stealers are one of the most common threats. This category of malware includes famous malware like Azorult, Agent Tesla, and Hawkeye. The infostealer...
New Ramsay Malware That Can Breach Air Gapped Networks
Researchers from cyber-security firm ESET announced today that they discovered a never-before-seen malware framework with advanced capabilities that are rarely seen today.
Named Ramsay, ESET says this malware toolkit appears...
Chinese authorities monitor content of WeChat users registered outside China
Users cannot determine whether their content has been monitored and, if so, why.
WeChat chat accounts registered outside of China are subject to the same level of control as Chinese...
Crypto Stealing Chrome Extensions Discovered
A security researcher discovered another 22 Google Chrome web browser extensions that tried to steal users’ cryptocurrencies.
A security researcher has discovered another 22 Google Chrome web browser extensions built...
How to Protect Your Crypto from Cyber Attacks During Covid
The 1997 indie horror movie Cube posited a dystopic future where unwilling prisoners are systematically dismembered by a high-tech prison. The SARS-CoV-2 pandemic has created an environment for a similar virtualized...
Monero-Mining Campaign Blue Mockingbird Exploits Web Apps
The cybercriminals are utilizing a deserialization weakness, CVE-2019-18935, to accomplish remote code execution before moving horizontally through the enterprise.
A Monero digital currency mining effort has developed that abuses a...