Cybersecurity News
What’s it like to work as a malware researcher? 10 questions answered
Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field
The post What’s it like to work as a malware researcher? 10 questions answered appeared first on WeLiveSecurity
Arrests were made, but the Mekotio Trojan lives on
Law enforcement cut off tails, but not the head of the cybercriminal operation.Squid Game Crypto Scammers Rips Off Investors for Millions
Anti-dumping code kept investors from selling SQUID while fraudsters cashed out.Ransomware Gangs Target Corporate Financial Activities
The FBI is warning about a fresh extortion tactic: threatening to tank share prices for publicly held companies.Android Patches Actively Exploited Zero-Day Kernel Bug
Google’s Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.Man charged with hacking major US sports leagues to illegally stream games
On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000
The post Man charged with hacking major US sports leagues to illegally stream games appeared first on WeLiveSecurity
Man charged with hacking major US sports leagues to illegally stream games
On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000
The post Man charged with hacking major US sports leagues to illegally stream games appeared first on WeLiveSecurity
Apple macOS Flaw Allows Kernel-Level Compromise
‘Shrootless’ allows bypass of System Integrity Protection IT security measures to install a malicious rootkit that goes undetected and performs arbitrary device operations.The ‘Groove’ Ransomware Gang Was a Hoax
A number of publications in September warned about the emergence of "Groove," a new ransomware group that called on competing extortion gangs to unite in attacking U.S. government interests online. It now appears that Groove was all a big hoax designed to toy with security firms and journalists.Squid Game cryptocurrency creators pull the rug from under investors, steal millions
The coin has crashed in what appears to be an exit scam.Cybercriminals flog access to international shipping, logistics giants
The underground hosts initial access brokers with entry to companies key in global supply chains.Office 365 Phishing Campaign Uses Kaspersky’s Amazon SES Token
It's a legitimate access token, stolen from a third-party contractor, that lets the attackers send phishing emails from kaspersky.com email addresses.Pirate Sports Streamer Gets Busted, Pivots to MLB Extortion
An alleged sports content pirate is accused of not only hijacking leagues' streams but also threatening to tell reporters how he accessed their systems.‘Trojan Source’ Hides Invisible Bugs in Source Code
The old RLO trick of exploiting how Unicode handles script ordering and a related homoglyph attack can imperceptibly switch the real name of malware.‘Trojan Source’ Bug Threatens the Security of All Code
Virtually all compilers -- programs that transform human-readable source code into computer-executable machine code -- are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities into any software without being detected, new research released today warns. The vulnerability disclosure was coordinated with multiple organizations, some of whom are now releasing updates to address the security weakness.Google Chrome is Abused to Deliver Malware as ‘Legit’ Win 10 App
Malware delivered via a compromised website on Chrome browsers can bypass User Account Controls to infect systems and steal sensitive data, such as credentials and cryptocurrency.Week in security with Tony Anscombe
ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Week in security with Tony Anscombe
ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity