Malicious PyPI packages drop ransomware, fileless malware
In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, discusses newly found PyPI packages that pack ransomware, and another package that appears to be safe but silently drops fileless malware to mine cryptocurrency (Mone.....»»
Why AI-enhanced threats and legal uncertainty are top of mind for risk executives
AI-enhanced malicious attacks are the top emerging risk for enterprises in the third quarter of 2024, according to Gartner. Key emerging risks for enterprises It’s the third consecutive quarter with these attacks being the top of emerging risk. IT.....»»
Law enforcement operation takes down 22,000 malicious IP addresses worldwide
Operation Synergia II took aim at phishing, ransomware, and information stealing. An international coalition of police agencies has taken a major whack at criminals accused of run.....»»
North Korean hackers employ new tactics to compromise crypto-related businesses
North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July 2024, phishing emails seemingly containing helpful information on risks related to the.....»»
GoZone ransomware accuses and threatens victims
A new ransomware dubbed GoZone is being leveraged by attackers that don’t seem to be very greedy: they are asking the victims to pay just $1,000 in Bitcoin if they want their files decrypted. The GoZone HTML ransom note (Source: SonicWall) The.....»»
Valencia floods: Warming climate is making once-rare weather more common and more destructive, says researcher
In the last few days, a seasonal weather system known in Spain as the "cold drop" or DANA (an acronym of "depresión aislada en niveles altos": isolated depression at high levels) has caused heavy rain and flooding across Spain's Mediterranean coast.....»»
Hundreds of code libraries posted to NPM try to install malware on dev machines
These are not the the developer tools you think they are. An ongoing attack is uploading hundreds of malicious packages to the open source node package manager (NPM) repository in.....»»
Google’s Pixel Weather Appears to be Widely Rolling Out to Older Pixel Devices
As a part of the October Pixel Feature drop, Google shared that it was planning to push the Pixel Weather app to older Pixel devices, including the Pixel 6. But as is the case with almost every feature drop, the timing was vague or needed a rollout.....»»
North Korean hackers pave the way for Play ransomware
North Korean state-sponsored hackers – Jumpy Pisces, aka Andariel, aka Onyx Sleet – have been spotted burrowing into enterprise systems, then seemingly handing matters over to the Play ransomware group. Timeline of the attack (Source: Pal.....»»
Terrifying Android malware redirects your calls to hackers
Imagine making a phone call to your bank but ending up speaking to a hacker on the other end of the line. That is precisely … The post Terrifying Android malware redirects your calls to hackers appeared first on BGR. Imagine making a.....»»
Android Trojan that intercepts voice calls to banks just got more stealthy
FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Researchers have found new versions of a sophisticated Android financial-fraud Trojan that’.....»»
Ransomware hits web hosting servers via vulnerable CyberPanel instances
A threat actor – or possibly several – has hit approximately 22,000 vulnerable instances of CyberPanel and encrypted files on the servers running it with the PSAUX and other ransomware. The PSAUX ransom note (Source: LeakIX) The CyberPane.....»»
Russian hackers deliver malicious RDP configuration files to thousands
Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is targeting government, academia, defense, and NGO workers with phishing emails containing a signed Remote Desktop Proto.....»»
Future Samsung phones could ditch the Galaxy branding
It seems that for future flagship handsets, Samsung could potentially drop the Galaxy branding from its name. The post Future Samsung phones could ditch the Galaxy branding appeared first on Phandroid. Samsung has pretty good branding for.....»»
US charges suspected Redline infostealer developer, admin
The identity of a suspected developer and administrator of the Redline malware-as-a-service operation has been revealed: Russian national Maxim Rudometov. Infrastructure takedown As promised on Monday when they announced the disruption of the Redline.....»»
Patching problems: The “return” of a Windows Themes spoofing vulnerability
Despite two patching attempts, a security issue that may allow attackers to compromise Windows user’s NTLM (authentication) credentials via a malicious Windows themes file still affects Microsoft’s operating system, 0patch researchers hav.....»»
Kremlin-backed hackers have new Windows and Android malware to foist on Ukrainian foes
"Civil Defense" pushes hybrid espionage/influence campaign targeting recruits. Google researchers said they uncovered a Kremlin-backed operation targeting recruits for the Ukraini.....»»
Black Basta operators phish employees via Microsoft Teams
Black Basta ransomware affiliates are still trying to trick enterprise employees into installing remote access tool by posing as help desk workers, now also via Microsoft Teams. Phishing via MS Teams Earlier this year, Rapid7 warned about Black Basta.....»»
Apple posts new M4 iMac announcement video, confirms more products coming
A new iMac announcement video ushers in Apple's newest desktop computer— but also confirms that two more products will drop this week.Image Credit: AppleThe video clocks in at just over 10 minutes long and features all the polish of a full-featured.....»»
Police hacks, disrupts Redline, Meta infostealer operations
The Dutch National Police, along with partner law enforcement agencies, has disrupted the operation of the Redline and Meta infostealers and has collected information that may unmask users who paid to leverage the infamous malware. Screenshot of the.....»»
A good cyber leader prioritizes the greater good
In the war against malicious cyber activity, it’s time for security vendors to step in – and it’s not how you might think. CISA Director Jen Easterly put it right at this year’s Black Hat conference: “We got ourselves into this; we have to.....»»