Tag: Malware
-
HP Wolf Security Says Hackers Are Exploiting CAPTCHA To Spread Malware
HP Wolf Security researchers have launched a new complaint against CAPTCHA in the latest edition of the HP Threat Insights Report. This …
-
HP Says Hackers Are Exploiting CAPTCHA To Spread Malware
HP Wolf Security researchers have launched a new complaint against CAPTCHA in the latest edition of the HP Threat Insights Report. This …
-
Novel Arcane infostealer facilitates extensive data pilfering
Intrusions involving the newly emergent Arcane Stealer malware with comprehensive data theft capabilities have been deployed by suspected …
-
Thousands of WordPress sites impacted by multi-year DollyWay campaign
Despite spreading ransomware and banking trojans in its previous iterations, the latest DollyWay v3 campaign sought to target WordPress …
-
Rooted Androids 3,000x More Likely to Be Breached, Even iPhones Not Safe
Despite tighter security from Apple and Google, hackers and cybercriminals continue to exploit rooted and jailbroken devices for their …
-
Smashing Security podcast #409: Peeping perverts and FBI phone calls
In episode 409 of the “Smashing Security” podcast, we uncover the curious case of the Chinese cyber-attack on Littleton’s Electric …
-
Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide
A significant malware operation, dubbed “DollyWay,” has been uncovered by GoDaddy Security researchers, revealing a sophisticated …
-
Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees
The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted cyberattacks against employees of the …
-
Supply-chain CAPTCHA attack hits over 100 car dealerships
A security researcher has discovered that the websites of over 100 car dealerships have been compromised in a supply-chain attack that …
-
Scam Alert: FBI ‘Increasingly Seeing’ Malware Distributed In Document Converters
Image: iStockphoto/domoyega Threat actors may attempt to distribute malware, including ransomware, by offering free document converters, …
-
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners
Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar …
-
Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected
Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to infiltrate and navigate …
●●●