Israeli orgs targeted with wiper malware via ESET-branded emails
Attackers have tried to deliver wiper malware to employees at organizations across Israel by impersonating cybersecurity company ESET via email. The phishing email The attack took the form of a phishing email ostensibly sent by the “Eset Advanc.....»»
8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency.....»»
Supply chain emerges as major vector in escalating automotive cyberattacks
In this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused losses exceeding $11 billion. These attacks mainly targeted automotive supplier.....»»
Ransomware trends and recovery strategies companies should know
Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in.....»»
Cleafy improves banking security with real-time AI capabilities
In the ever-evolving landscape of banking and financial security, new malware variants poses a significant and imminent challenge. Traditionally, both the identification and classification of these threats only occurred post-attack, leaving banks and.....»»
A soldier"s iPhone stopped a bullet, saving his life
An Israeli soldier's life was saved by his iPhone when it stopped a bullet, so he and his fellow soldiers were gifted new ones by Prime Minister Benjamin Netanyahu and Rabi Shai Graucher.iPhone 15The iPhone is rated against dust, water, and some extr.....»»
Qakbot returns in fresh assault on hospitality sector
The Qakbot botnet has been disrupted this summer, but cybercriminals are not ready to give up on the malware: Microsoft’s threat analysts have spotted a new phishing campaign attempting to deliver it to targets in the hospitality industry. Qakb.....»»
Creating a formula for effective vulnerability prioritization
In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. Gorelik discusses challenges posed by regulatory frameworks, incomplete asset inventor.....»»
Are our smart devices listening in on us? This report seems to think so
According to marketing materials, it seems that a marketing company apparently has a tool that can listen in on our conversations to help create more targeted ads. The post Are our smart devices listening in on us? This report seems to think so appea.....»»
OilRig targets Israel organizations with new lightweight downloaders
ESET researchers analyzed a growing series of new OilRig downloaders that the group used in several campaigns throughout 2022 to maintain access to target organizations of special interest, all located in Israel. They include an organization in the h.....»»
New chemical method advances toward targeted RNA medicine
Targeted drugs aim to pinpoint the exact location in the body where diseased tissue is located and where the medicine is required. The manifold benefits of administering a targeted drug include heightened efficacy, as the drug is meticulously designe.....»»
DNSFilter introduces new capability to filter generative AI
DNSFilter announced the expansion of its protective DNS software with a new Generative AI category. DNSFilter’s defense provides organizations of all sizes the ability to secure their network against harmful threats such as malware, botnet, and.....»»
FTC warns QR codes can steal money and install malware
QR codes are great for convenience, but how often do you check where they're taking you?.....»»
Recruiters, beware of cybercrooks posing as job applicants!
Recruiters are being targeted via spear-phishing emails sent by cybercrooks impersonating job applicants, Proofpoint researchers are warning. “The tone and content of the emails suggest to the recipient the actor is a legitimate candidate, and.....»»
Lazarus exploit Log4Shell vulnerability to deliver novel RAT malware
North Korea-backed group Lazarus has been spotted exploiting the Log4Shell vulnerability (CVE-2021-44228) and novel malware written in DLang (i.e., the memory-safe D programming language). “This campaign consists of continued opportunistic targ.....»»
Stussy-branded Beats Studio Pro go on sale December 15
Beats has collaborated with streetwear label Stussy on a pair of Beats Studio Pro, with a 1990's-inspired design scheme used for the limited-edition headphones.The Apple-owned Beats has collaborated with a number of high-profile design and fashion br.....»»
German supplier Gedia sells Detroit-area operations, to lay off 92
It’s unclear who the buyer of Gedia’s Michigan operations is, and representatives for the company and Orion Township did not return emails or calls about the deal......»»
The growing abuse of QR codes in malware and payment scams prompts FTC warning
The convenience of QR codes is a double-edged sword. Follow these tips to stay safe. Enlarge / A woman scans a QR code in a café to see the menu online. The US Federal Trade Commission has become the latest organizatio.....»»
German supplier Gedia sells Detroit area operations, to lay off 92
It’s unclear who the buyer of Gedia’s Michigan operations is, and representatives for the company and Orion Township’s supervisor’s office did not return emails or calls about the deal......»»
Stealthy Linux rootkit found in the wild after going undetected for 2 years
Krasue infects telecom firms in Thailand using techniques for staying under the radar. Enlarge Stealthy and multifunctional Linux malware that has been infecting telecommunications companies went largely unnoticed for t.....»»
Modified caffeine molecules help medical research move forward
Before researchers can develop targeted drugs, they need to know exactly how a disease works. Biochemist Bert Beerkens created molecules that allow them to find out. He used caffeine as the basis for new molecules that enable research into certain re.....»»