Tag: Malware
-
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access …
-
Smashing Security podcast #369: Keeping the lights on after a ransomware attack
Leicester City Council suffers a crippling ransomware attack, and a massive data breach, but is it out of the dark yet? And as election …
-
5 Most Common Encryption Algorithms And Methods
Whenever most people hear the term “encryption algorithm,” they tend to get a blank look on their faces and think it’s a topic best …
-
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad. …
-
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted …
-
Russian group exploits Windows print spooler bug via ‘GooseEgg’ malware
Microsoft says a previously undocumented malware it calls “GooseEgg” is being used by Russian threat group APT28 to exploit a known Windows …
-
Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
For nearly four years and perhaps even longer, Forest Blizzard (aka Fancy Bear, aka APT28) has been using a custom tool that exploits a …
-
End-to-End Encryption Sparks Concerns Among EU Law Enforcement
European Police Chiefs have issued a plea for urgent action from both industry and governments to safeguard public safety on social media …
-
Can You Outsmart Social Media Scammers? Unlocking The Secrets of Social Media Scams
Social media scams are like those little troublemakers lurking in the corners of our online lives. We’re all about getting those likes, …
-
What Is The Difference Between Hack And Virus?
This post will show you the difference between a hack and a virus. Since the inception of the internet era, most non-tech computer users …
-
Malicious PyPI Package Attacking Discord Users To Steal Credentials
Hackers often target PyPI packages to exploit vulnerabilities and inject malicious code into widely used Python libraries. Recently, …
-
Encryption debate rolls on – European police chiefs do not accept ‘binary choice between cyber security and privacy’
The great end-to-end encryption debate continues to roll on in Europe, as police chiefs from the region released a joint declaration …
●●●