Cyber threats
Severe zero-day vulnerabilities in Adobe's Acrobat and ReaderUrgent updates to address serious zero-day vulnerabilities in Adobe's Acrobat and ReaderAdobe has released security updates to fix a zero-day vulnerability in Acrobat and Reader, along with other fixed vulnerabilities. The attacks exploit a flaw that allows the execution of unauthorized code. Users are encouraged to install updates to protect themselves.
WiKI-Eve attack: stealing passwords from WiFi routersThe new technique that compromises the security of Wi-Fi networks, putting user passwords at riskA new attack called WiKI-Eve exploits a vulnerability in WiFi to intercept passwords typed on smartphones. Researchers found that this attack can guess numeric passwords in less than 100 attempts with 85% accuracy. Improved security measures are needed to protect against this type of attack.
North korean hackers target cybersecurity community with zero-day attacksSophisticated tactics deployed by North Korean hackers shake cybersecurity communityNorth Korean hackers are targeting the cybersecurity community, using social engineering tactics to establish trust with their victims. They exploit zero-day vulnerabilities in popular software, evade detection through anti-VM checks, and gather information from victims' systems. This is not their first...
MacOS malware: s new threat for Apple usersA sophisticated threat that endangers the security of Apple devices and sensitive user dataThe Atomic Stealer malware for MacOS manages to bypass the Gatekeeper, the operating system's security. It is distributed via Google ads and presents itself as TradingView platform to lure victims. Once downloaded, it convinces victims to give up their password. Users should be careful to download apps...
New variant of Mirai botnet infects Android TV set-top boxesThe new threat to Android TV devices: Pandora malware spreads rapidly among low-cost set-top boxesA new variant of the Mirai malware has been discovered on low-cost Android TV devices. It spreads via malicious firmware updates and pirated apps. The user can protect themselves by choosing reputable brands and avoiding unofficial sources. Awareness about the risk of pirated content is essential.
Google's Chrome Store review process foiled by Data-StealerMalicious extensions threaten user security despite Google's new measuresAttackers can still bypass Google's review process to get malicious extensions into the Chrome Web Store, stealing sensitive data. Vulnerabilities have been discovered in the input fields of web pages. Researchers suggest measures to protect sensitive browser data.
Internal risk management in cybersecurity: a complex challengeAdvanced protection strategies to counter insider threats in cybersecurityThe article highlights the importance of managing internal risk in cybersecurity. It is highlighted that cyber attacks often involve internal components, such as employees. The difference between "internal risk" and "internal threat" and the importance of adopting a multi-layered defense strategy are...
Phishing and sex extortion: how to defend yourself and protect your reputationHow to defend yourself from online scams and preserve your privacy: advice and security measures to adoptA new sex-extortion scam scheme is targeting YouPorn users, threatening to publicly release a sex tape unless they pay a sum in cryptocurrency. Attackers exploit users' emotional vulnerability but experts advise not to give in to blackmail and to report the incident to the competent authorities.
Chrome extensions: beware of password theftMalicious Chrome extensions: how to protect your passwordsSome Chrome extensions may steal plaintext passwords from websites. Malicious extensions access data stored by the browser and recover passwords without encryption. It is recommended to uninstall suspicious extensions and use a reliable password manager to protect your credentials. Keep your browser...
MSSQL database under attack by Freeworld ransomwareThe Freeworld ransomware threat is putting MSSQL databases at risk: protect yourself with these security measuresFreeworld ransomware is attacking MSSQL databases, encrypting data and demanding a ransom to restore access. Organizations need to take security measures such as updating software and protecting backups to avoid damage and financial loss.
SandWorm: the feared hacker group that threatens UkraineThe danger of SandWorm: a group of hackers that threatens international securityThe article talks about the hacker group called SandWorm and their targeted cyber attacks in Ukraine. The group uses sophisticated phishing techniques and vulnerability exploits to infiltrate networks and steal sensitive information. In particular, their advanced malware called “Chisel” is mentioned. The...
DreamBus botnet exploits RocketMQ vulnerability to spread a cryptocurrency minerAn in-depth look at the DreamBus botnet's dissemination tactics and impacts on enterprise systemsThe DreamBus botnet exploits a vulnerability in RocketMQ software to spread a cryptocurrency miner. This malware infects systems and uses computing resources for mining. It is important to update your software, set up a firewall and use an advanced security solution to protect yourself from Dream...
Fight against cybercrime: the FBI intervenes and dismantles a vast network of infected computersThe joint action of the FBI and international partners to neutralize the Qakbot banking malwareThe FBI has dismantled the network of computers infected with Qakbot, a dangerous banking malware. This action represents a great victory in the fight against cybercrime. Users are advised to take security measures to protect their data.
Dramatic increase in DarkGate malware activityHow to protect computer systems from its advance: defense strategies and preventive measuresDarkGate malware is showing a worrying increase in use and diffusion. This sophisticated malware poses a significant threat to cyber security, with financial consequences for businesses. To defend yourself, it is important to keep your software up-to-date and take preventative measures such as user education...
Phishing as a Service gets smarterThe hidden danger in phishing: how to protect yourself from new Phishing as a Service AttacksPhishing as a Service (PhaaS) is a new method that allows cybercriminals to conduct sophisticated phishing attacks without technical knowledge. It offers paid phishing services, with advanced features. It is important to take security measures and work with the authorities to counter this threat.
WhatsApp attack: scams from unknown calls to Indian usersWhatsApp scams from the United States are on the rise: Indian users at risk of online privacy and securityWhatsApp scams from the US are putting the privacy of Indian users at risk. Scammers make unwanted calls, share deceptive links, or solicit personal or financial information. Users must avoid answering unknown numbers and be wary of calls. It is important to educate users about online safety.
LockBit 3.0: the new ransomware of cybercriminalsRansomware targeting businesses with cryptocurrencies and sophisticated featuresLockBit 3.0 is an advanced ransomware that is targeting businesses with file encryption and ransom demand. It's hard to counter, but experts recommend safety measures like regular software updates and data backups.
Crime as a Service (CaaS): the organized forms of crime multinationalsThe evolution of crime in the digital worldThe article explores the emerging phenomenon of "Crime as a Service" in the digital world. It describes how multinational crime companies offer specialized services to commit cyber crimes, the dangers this entails and the need for a global fight against this form of organized crime.
The threat of SEO Poisoning in healthcareThe invisible threat that puts information security in the health sector at riskThe article addresses the emerging threat of SEO poisoning in healthcare, explaining how it works and what its implications are for patient data security. Preventive measures are suggested to counter this threat and ensure cyber security in healthcare sector.
Vulnerability exploited in WinRAR for zero-day attacksSerious WinRAR vulnerability puts users' cyber security at risk: discovery and solutionsA serious vulnerability in the popular WinRAR program allows hackers to execute malicious code on users' systems. Millions of users may be at risk, but you can protect yourself by updating your software and being careful about RAR files from untrusted sources.
A new malware uses Wi-Fi scanning to obtain the location of the infected deviceThe evolution of threats and the importance of keeping devices protectedA new piece of malware uses Wi-Fi scanning to locate infected devices. It is important to protect yourself with updated software, antivirus and firewall, avoid suspicious links and public networks. Businesses and users must take security measures to counter increasingly sophisticated cyberthreats.
Cuba's advance: a growing threat to companiesThe tactics and intricacies of the Cuba ransomware groupRansomware group called "Cuba" is a serious threat that uses sophisticated tactics to infect and make ransom demands. His evasive techniques make it difficult to protect systems. Collaboration and advanced security are essential to counter this threat.
Carderbee cyber attacks rock Hong KongHong Kong businesses need to strengthen their cyber defenses to protect themselvesHong Kong targeted by Carderbee's cyber attacks Carderbee, a dangerous group of hackers specializing in carding and financial identity theft, has pressured the cyber defenses of numerous companies and financial institutions in Hong Kong, causing serious financial damage. Authorities work together to...
WinRAR: severe vulnerability puts your data security at riskCritical vulnerability putting millions of users and sensitive data at risk. Here's what you need to know about WinRARCritical vulnerability discovered in WinRAR, with risk of malicious code execution via malicious archives. Users are advised to update the software and take security measures to protect their systems. Promoting the culture of information security is essential.
WoofLocker: the unsuspected cybertool that puts companies' security at riskThe challenge of cybercrime and new defense strategiesThe WoofLocker toolkit is a dangerous new malware tool capable of hiding cyberthreats in an unimaginable way. It can evade antiviruses and infiltrate corporate networks, posing a growing threat to businesses and users. Security organizations are struggling to come up with effective countermeasures.
The dark link between proxy apps and Proxynation malwareThe growing threat of malware and the widespread use of proxy appsThe article explores the dark link between proxy apps and malware, focusing on "Proxynation". Explains how proxy apps can be used by cybercriminals to spread malware and the associated risks. It also suggests some measures to protect yourself from Proxynation and mitigate the dangers.
Statc Stealer emergency: new malware threatens sensitive dataThe invisible threat that puts your security at riskA dangerous new malware called Statc Stealer poses a threat to the security of sensitive data. Malware can infiltrate systems, steal valuable information, and compromise user privacy. Robust security practices must be implemented to protect systems from malware.
Critical vulnerability in Visual Studio Code: malicious extensions steal tokensA security flaw has been discovered in the popular code editor that puts developers' safety at riskCritical vulnerability discovered in Visual Studio Code: malicious extensions can steal authentication tokens. The developers have been notified and a security patch has been released. Users are advised to update software and pay attention to installed extensions. Antivirus software, strong passwords,...
Skidmap Redis: evolution and countermeasures for the new miner malwareOperational methodology, security implications and defense strategiesThe recent Skidmap malware not only mines cryptocurrencies, but also acquires root permissions, expanding its destructive potential. This malware uses a sophisticated technique based on replacing kernel modules to stay hidden. To protect yourself, it is important to constantly update your software, use...
The emergence of Shadow APIs in the cybersecurity industryUnderstanding and managing the threats posed by Shadow APIs in information security systemsThe article examines the growing problem of "Shadow APIs" in cybersecurity. APIs make it easier for apps to interact, but they can create a risk if not properly monitored and managed. The article emphasizes the importance of proper security management to prevent and respond to cyber attacks.
Analysis of Reptile: the sophisticated rootkit that threatens Linux systemsThe features, evasion strategies and prevention tips of the Reptile rootkitThe article deals with the "Reptile", a rootkit for Linux capable of acting both as a rootkit and as a trojan, evading detections. The Reptile allows unauthorized access to systems, allowing hackers to access sensitive data. To counter this threat, awareness of online safety, updating of operating systems...
FBI alert: scammers playing the robe of NFT developersScam methods and protective measures in the emerging NFT marketFBI warns of scammers posing as NFT developers to steal users' cryptographic data. They use techniques such as phishing and outright deception. Digital awareness is key to preventing these scams. Security bodies, the crypto community and NFT developers should come together to fight digital crime.
Digital fraud beware: government warning about ChatGPT scamsUnveiled the modus operandi of a new web risk: the dark side of ChatGPTThe article warns about digital scams related to the use of ChatGPT, a chat platform based on Artificial Intelligence. Fraudsters use chatbots to obtain sensitive information or trick users into clicking on dangerous links. We stress the importance of not revealing private details online and using antivirus...
Cybersecurity and quantum computing: together towards the futureThe battle between security and threats in the world of quantum computingThe article highlights the importance of cybersecurity in quantum computing, pointing out the potential threats from cybercriminals. Indicates the adoption of advanced security measures, such as post-quantum cryptography. Finally, it emphasizes the need for continuous innovation to meet future ch...
Leveraging the Google AMP service: new frontiers for phishing attacksIllegal use of Accelerated Mobile Pages in phishing attempts: a challenge for online securityPhishing attacks are becoming more sophisticated, using the Google AMP service to create URLs that masquerade as legitimate, making them difficult to detect. To counter these attacks, a multi-layered security approach is recommended, with advanced techniques and the use of two-factor authentication.
Malware services for hire: Wikiloader's alarming triumph in cybercrimeAn overview of the growing phenomenon of Malware as a Service (MaaS)Cybersecurity experts have noticed an increase in the use of Wikiloader, a malware distribution tool, in the Malware as a Service (MaaS) market. Wikiloader is versatile and can be used to carry out various types of cyber attacks, from phishing scams to botnets, thus increasing the number of possible...
Security emergency: the growing danger of VHD malware on ICS systemsModus operandi and impact of the advanced cyber threat on industrial systemsThe article discusses advanced malware called VHD that attacks industrial control systems. This malware is capable of damaging even devices isolated from the network. To counter this, the article highlights the importance of multi-layered cybersecurity strategies.
Ransomware Abyss Locker and the assault on VMware ESXi servers: analysis and preventive actionsEscalation of targeted and customized attacks puts Linux and VMware ESXi users at riskThe article is about a variant of ransomware called Abyss Locker, now attacking VMware ESXi servers on Linux. This ransomware shares similarities with Ragnar Locker, being able to encrypt particular file extensions. The article emphasizes the importance of implementing security measures, keeping up to...
SUBMARINE backdoor: the new and disturbing threat to computer securityHow hackers use open source to break into corporate systemsThe piece talks about a new, sophisticated hacker attack called "SUBMARINE backdoor". This leverages open source tools to penetrate corporate networks, creating hidden passageways to steal sensitive data. The article highlights the importance for businesses to strengthen their defenses and stay up-to-date...
Ransomware: when video game cheats become a threatCryptocurrency scams and fake video game cheatsThe article highlights a recent cybersecurity discovery: a ransomware disguised as a cheat for the Call of Duty: Modern Warfare 2 video game. The malware is activated when the user downloads and installs the fake cheat, encrypting files and asking for a ransom for their recovery. To avoid such threats,...
Phishing and cryptocurrency fraud in fake government emailsSpoofing techniques and guidelines to protect yourself from these scamsThe article deals with phishing attacks via emails that appear to come from Italian government agencies, which are actually used to scam users by stealing cryptocurrencies. The deception uses a technique called "spoofing". The article stresses the importance of being careful when handling emails and...
CherryBlossom: a new Android malware among usAndroid CherryBlossom malware modus operandi and digital security tipsCherryBlossom Android malware can steal various sensitive data from smartphones, posing a danger to users' safety. The malware is activated through pre-installed infected applications and can evade security software. Apart from data theft, it can install further malware. Experts recommend installing...
IcedID strengthens its capabilities: new methods of dissemination and attackThe malware sharpens its claws. It's hard to detectThe malware loader IcedID has updated its BackConnect module, making it harder to detect by shifting its traffic. The number of command-and-control servers has also increased and IcedID may be utilizing victims for spamming operations, amplifying the damage caused.
Generative artificial intelligence and enterprise security threatsBalance between innovation and security: the implications of generative artificial intelligenceThe article discusses the potential risks of generative AI for corporate security, such as the creation of false images or realistic texts used for fraud. However, he points out that there are methods of protection, such as strong encryption and the adoption of strict security protocols. Despite the...
Ubuntu: nearly half of users are vulnerable to new cyberthreatThe critical Ubuntu vulnerability: emerging threat clarifications and tips for proper security managementRecent research highlights a significant risk to Ubuntu users due to new vulnerabilities, which allow elevation of privilege in the system. On these critical issues, the Ubuntu developers have responded promptly by releasing security updates. To ensure effective protection, it is imperative that users...
FraudGPT: a new malicious chatbot emergesThin lines of code: from mimicking human speech to online security threatsThe article talks about FraudGPT, a malicious chatbot that replicates human speech by convincing users to reveal personal information. Emphasize the importance of online safety and digital literacy in countering these threats. Finally, it invites you to be constantly updated on new threats and ways to...
Mallox ransomware alert: significant risks to unprotected MS SQL serversDeciphering the attack mechanism of Mallox malwareThe article warns of the rise of Mallox ransomware, which attacks unprotected Microsoft SQL servers using brute force techniques. The malware encrypts data and demands a ransom for the decryption key. To counter these attacks, the article suggests strengthening server security, changing passwords frequently,...
Security emergency: experts warn of MikroTik router riskExploitation of the Chimay Red exploit and protective measures for MikroTik usersCybersecurity experts have discovered a serious vulnerability in MikroTik routers that could affect up to 900,000 devices worldwide. The "Chimay Red" exploit allows remote installation of malicious software. MikroTik has released a fix tool, however many out-of-date devices remain at risk. Users are...
BlackCat: the ransomware that hits ItalyThe operating mechanism and preventive strategies for the new cyber danger have been revealedItaly has been hit by a major ransomware attack called 'BlackCat', which encrypts user data making it inaccessible and requires payment for its decryption. This attack caused significant losses to many companies. It is imperative to prevent such attacks with constant system updates, the use of robust...
Google Ads: unwitting vehicle for spreading malwareTrojans Glupteba and Vidar target via Google AdsGoogle ads have been used by cybercriminals to spread malware, most notably the Glupteba and Vidar trojans. These trojans get installed on users' systems when they click on fake advertisements. This underlines the importance of strengthening cyber security.