Cybersecurity News


Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info

Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info Threat actors target Office 365 and Google Workspace in a new campaign, which uses a legitimate domain associated with a road-safety center in Moscow to send messages.
06 April 2022

This new malware targets AWS Lambda environments

Denonia malware is abusing servers to run cryptocurrency miners.
06 April 2022

Fake e‑shops on the prowl for banking credentials using Android malware

ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks

The post Fake e‑shops on the prowl for banking credentials using Android malware appeared first on WeLiveSecurity

06 April 2022

Fake Android shopping apps steal bank account logins, 2FA codes

Customers of Malaysian banks are being turned into cash cows.
06 April 2022

Authorities Fully Behead Hydra Dark Marketplace

Authorities Fully Behead Hydra Dark Marketplace The popular underground market traded in drugs, stolen data, forged documents and more -- raking in billions in Bitcoin.
05 April 2022

FIN7 hackers evolve operations with ransomware, novel backdoor

Researchers have explored the shift in the sophisticated group's latest tactics.
05 April 2022

No-Joke Borat RAT Propagates Ransomware, DDoS

No-Joke Borat RAT Propagates Ransomware, DDoS This fresh malware strain extends the functionality of typical trojans with advanced functionality and a series of modules for launching various types of threat activity.
05 April 2022

GitHub now scans for secret leaks in developer workflows

The new tool aims to protect developers against API and token exposure.
05 April 2022

US judge sentences men for $1.5 million Apple Gift Card scam

Apple is also owed over $1 million in damages.
05 April 2022

We’re going on Tor

If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser.

The post We’re going on Tor appeared first on WeLiveSecurity

05 April 2022

Borat RAT malware: a 'unique' triple threat that is far from funny

The malware combines remote access, spyware, and ransomware into one nasty package.
04 April 2022

Turkey seeks 40,000-year sentences for alleged cryptocurrency exit scammers

21 suspects are wanted in connection to a defunct Turkish crypto exchange.
04 April 2022

Week in security with Tony Anscombe

Under the hood of Wslink's VM – The energy sector & cyber-risk – SMB cybersecurity survival tips

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

01 April 2022

Apple Rushes Out Patches for 0-Days in MacOS, iOS

Apple Rushes Out Patches for 0-Days in MacOS, iOS The vulnerabilities could allow threat actors to disrupt or access kernel activity and may be under active exploit.
01 April 2022

Chinese hackers Deep Panda return with Log4Shell exploits, new Fire Chili rootkit

Log4Shell is being exploited to deploy the kernel rootkit.
01 April 2022

Zyxel urges customers to patch critical firewall bypass vulnerability

The vendor has issued a severity score of 9.8.
01 April 2022

The spectre of Stuxnet: CISA issues alert on Rockwell Automation ICS vulnerabilities

The flaws can be exploited to execute code on vulnerable controllers and workstations.
01 April 2022

Cybersecurity survival tips for small businesses: 2022 edition

How can businesses that lack the resources and technological expertise of large organizations hold the line against cybercriminals?

The post Cybersecurity survival tips for small businesses: 2022 edition appeared first on WeLiveSecurity

01 April 2022

Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of the U.S. Senate's most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal agencies for information about the frequency of such schemes.
31 March 2022

Belarusian ‘Ghostwriter’ Actor Picks Up BitB for Ukraine-Related Attacks

Belarusian ‘Ghostwriter’ Actor Picks Up BitB for Ukraine-Related Attacks Ghostwriter is one of 3 campaigns using war-themed attacks, with cyber-fire coming in from government-backed actors in China, Iran, North Korea & Russia.
31 March 2022