Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-07-22 16:43:09 |
Snowballing Ransomware Variants Highlight Growing Threat to VMware ESXi Environments (lien direct) |
Luna, Black Basta add to rapidly growing list of malware tools targeted at virtual machines deployed on VMware's bare-metal hypervisor technology. |
Threat
Ransomware
Malware
|
|
|
|
2022-07-21 20:25:24 |
Mysterious, Cloud-Enabled macOS Spyware Blows Onto the Scene (lien direct) |
The CloudMensis spyware, which can lift reams of sensitive information from Apple machines, is the first Mac malware observed to exclusively rely on cloud storage for C2 activities. |
Malware
|
|
|
|
2022-07-19 14:00:00 |
Protecting Against Kubernetes-Borne Ransomware (lien direct) |
The conventional wisdom that virtual container environments were somehow immune from malware and hackers has been upended. |
Ransomware
Malware
|
Uber
|
|
|
2022-07-18 22:32:02 |
Trojanized Password Crackers Targeting Industrial Systems (lien direct) |
Tools purporting to help organizations recover lost passwords for PLCs are really droppers for malware targeting industrial control systems, vendor says. |
Malware
|
|
|
|
2022-07-15 15:16:44 |
Sandworm APT Trolls Researchers on Its Trail as It Targets Ukraine (lien direct) |
Researchers who helped thwart the Russian nation-state group's recent attack on Ukraine's power supply will disclose at Black Hat USA what they found while reverse-engineering the powerful Industroyer2 malware used by the powerful hacking team. |
Malware
|
|
|
|
2022-07-07 14:04:26 |
Empower Your Security Operations Team to Combat Emerging Threats (lien direct) |
When examining the modern threat landscape, empowering your security operations and overcoming the limitations inherent with other malware prevention solutions is imperative. |
Threat
Malware
|
|
|
|
2022-06-29 18:41:02 |
ZuoRAT Hijacks SOHO Routers from Cisco, Netgear (lien direct) |
The malware has been in circulation since 2020, with sophisticated, advanced malicious actors taking advantage of the vulnerabilities in SOHO routers as the work-from-home population expands rapidly. |
Malware
|
|
|
|
2022-06-28 18:33:21 |
China-Backed APT Pwns Building-Automation Systems with ProxyLogon (lien direct) |
The previously unknown state-sponsored group is compromising industrial targets with the ShadowPad malware before burrowing deeper into networks. |
Malware
|
|
|
|
2022-06-23 01:24:30 |
Organizations Battling Phishing Malware, Viruses the Most (lien direct) |
Organizations may not encounter malware targeting cloud systems or networking equipment frequently, but the array of malware they encounter just occasionally are no less disruptive or damaging. That is where the focus needs to be. |
Malware
|
|
|
|
2022-06-21 14:30:40 |
BRATA Android Malware Evolves Into an APT (lien direct) |
The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities. |
Threat
Malware
|
|
|
|
2022-06-17 20:40:00 |
Ransomware and Phishing Remain IT\'s Biggest Concerns (lien direct) |
Security teams - who are already fighting off malware challenges - are also facing renewed attacks on cloud assets and remote systems. |
Malware
|
|
|
|
2022-06-17 13:00:00 |
Tackling 5 Challenges Facing Critical National Infrastructure Today (lien direct) |
The stakes are high when protecting CNI from destructive malware and other threats. |
Malware
|
|
|
|
2022-06-16 17:00:00 |
RSAC Startup Competition Focuses on Post-Cloud IT Infrastructure (lien direct) |
A secure Web browser takes the top prize, and for the second year in a row malware detection is an afterthought. |
Malware
|
|
|
|
2022-06-10 19:21:39 |
Symbiote Malware Poses Stealthy, Linux-Based Threat to Financial Industry (lien direct) |
A Linux-based banking Trojan is a master at staying under the radar. |
Threat
Malware
|
|
|
|
2022-06-10 16:53:33 |
New Linux Malware \'Nearly Impossible to Detect\' (lien direct) |
So-called Symbiote malware, first found targeting financial institutions, contains stealthy rootkit capabilities. |
Malware
|
|
|
|
2022-06-09 20:30:00 |
Prevent Breaches and Malware With Proactive Defenses (lien direct) |
Darktrace's Mike Beck joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about risk management. |
Malware
|
|
|
|
2022-06-09 18:30:04 |
Emotet Banking Trojan Resurfaces, Skating Past Email Security (lien direct) |
The malware is using spreadsheets, documents, and other types of Microsoft Office attachments in a new and improved version that is often able to bypass email gateway-security scanners. |
Malware
|
|
|
|
2022-06-07 13:38:41 |
Akamai Launches New Malware Protection for Uploaded Files (lien direct) |
Edge-based solution detects and blocks malicious files uploaded to Web apps and APIs. |
Malware
|
|
|
|
2022-06-02 15:00:09 |
\'Clipminer\' Malware Actors Steal $1.7 Million Using Clipboard Hijackingp (lien direct) |
The malware targets Windows users via Trojanized downloads of cracked or pirated software and then starts in on cryptocurrency mining and clipboard hijacking. |
Malware
|
|
★★★★
|
|
2022-06-01 21:08:04 |
FluBot Android Malware Operation Disrupted, Infrastructure Seized (lien direct) |
Security researchers have described the malware as among the fastest-spreading mobile threats in recent years. |
Threat
Malware
|
|
|
|
2022-05-27 16:07:03 |
New Chaos Malware Variant Ditches Wiper for Encryption (lien direct) |
The Chaos ransomware-builder was known for creating destructor malware that overwrote files and made them unrecoverable -- but the new Yashma version finally generates binaries that can encrypt files of all sizes. |
Malware
|
|
|
|
2022-05-27 15:49:24 |
ChromeLoader Malware Hijacks Browsers With ISO Files (lien direct) |
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections. |
Malware
|
|
|
|
2022-05-19 14:00:00 |
6 Scary Tactics Used in Mobile App Attacks (lien direct) |
Mobile attacks have been going on for many years, but the threat is rapidly evolving as more sophisticated malware families with novel features enter the scene. |
Threat
Malware
|
|
|
|
2022-05-10 15:37:57 |
5-Buck DCRat Malware Foretells a Worrying Cyber Future (lien direct) |
The Dark Crystal remote access Trojan (aka DCRat) breaks a few stereotypes, with coding done by a solo developer, using an obscure Web language and offering it at a frighteningly low price. |
Malware
|
|
★★
|
|
2022-05-06 19:25:51 |
Scammer Infects His Own Machine With Spyware, Reveals True Identity (lien direct) |
An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla. |
Malware
|
|
|
|
2020-12-29 07:50:00 |
Mac Attackers Remain Focused Mainly on Adware, Fooling Users (lien direct) |
Despite reports that Macs have encountered more threats than Windows systems, the platform still sees far fewer exploits and malware - including ransomware. |
Malware
|
|
|
|
2020-12-16 17:55:00 |
FireEye Identifies Killswitch for SolarWinds Malware as Victims Scramble to Respond (lien direct) |
White House National Security Council establishes unified group to coordinate response across federal agencies to the threat. |
Malware
|
|
|
|
2020-12-03 17:40:00 |
TrickBot\'s New Tactic Threatens Firmware (lien direct) |
A newly discovered module checks machines for flaws in the UEFI/BIOS firmware so malware can evade detection and persist on a device. |
Malware
|
|
|
|
2020-12-03 12:40:00 |
Researchers Bypass Next-Generation Endpoint Protection (lien direct) |
Machine learning-based products can be tricked to classify malware as a legitimate file, new findings show. |
Malware
|
|
|
|
2020-11-24 17:50:00 |
Latest Version of TrickBot Employs Clever New Obfuscation Trick (lien direct) |
The malware takes advantage of how the Windows command line interpreter works to try and slip past anti-detection tools, Huntress Labs says. |
Malware
|
|
|
|
2020-11-12 18:00:00 |
Manufacturing Sees Rising Ransomware Threat (lien direct) |
Crypto-ransomware groups are increasingly adopting malware and tools that can probe and attack operational technology, such as industrial control systems, according to an assessment of current threats. |
Threat
Ransomware
Malware
|
|
|
|
2020-11-12 15:20:00 |
New \'CostaRicto\' Hack-for-Hire Group Targets Global Businesses (lien direct) |
The group of APT mercenaries uses bespoke malware and strong operation security to target a range of organizations, located primarily in Southeast Asia. |
Malware
|
|
|
|
2020-11-10 18:05:00 |
Malware Hidden in Encrypted Traffic Surges Amid Pandemic (lien direct) |
Zscaler says attacks involving the use of SSL/TLS encryption jumped 260% in the first nine months of 2020 compared to the same period last year. |
Malware
|
|
|
|
2020-10-23 17:05:00 |
US Treasury Sanctions Russian Institution Linked to Triton Malware (lien direct) |
Triton, also known as TRISIS and HatMan, was developed to target and manipulate industrial control systems, the US Treasury reports. |
Malware
|
|
|
|
2020-10-21 10:00:00 |
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data (lien direct) |
Attacks involving an unmanaged device and no malware expose gaps in cybersecurity that must be addressed. |
Malware
|
|
|
|
2020-10-15 18:30:00 |
Prolific Cybercrime Group Now Focused on Ransomware (lien direct) |
Cybercriminal team previously associated with point-of-sale malware and data theft has now moved almost completely into the more lucrative crimes of ransomware and extortion. |
Ransomware
Malware
|
|
|
|
2020-10-14 14:00:00 |
Assuring Business Continuity by Reducing Malware Dwell Time (lien direct) |
Here's how CISOs and IT security operations teams can best address key challenges to network monitoring that could increase malware dwell time. |
Malware
|
|
|
|
2020-10-13 12:00:00 |
Trickbot Botnet Response Highlights Partnerships Preventing U.S. Election Interference (lien direct) |
Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption. |
Malware
|
|
|
|
2020-10-08 11:55:00 |
Kaspersky Researchers Spot Russia-on-Russia Cyber-Espionage Campaign (lien direct) |
Steganography-borne malware used to spy on industrial targets in Russia. |
Malware
|
|
|
|
2020-10-07 17:30:00 |
New \'HEH\' Botnet Targets Exposed Telnet Services (lien direct) |
Latest threat is one in a growing list of malware developed in the Go programming language. |
Threat
Malware
|
|
|
|
2020-10-07 14:30:00 |
CISA Warns of Renewed Emotet Activity (lien direct) |
The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020. |
Malware
|
|
|
|
2020-10-06 11:15:00 |
Malware for Ad Fraud Gets More Sophisticated (lien direct) |
Facebook says SilentFade campaign disabled notifications that could have warned users that their accounts had been compromised. |
Malware
|
|
|
|
2020-10-01 10:00:00 |
Cryptojacking: The Unseen Threat (lien direct) |
Mining malware ebbs and flows with the price of cryptocurrencies, and given the momentum on price is upward, cryptojacking is a very present threat. |
Threat
Malware
|
|
|
|
2020-10-01 09:45:00 |
Rise in Remote MacOS Workers Driving Cybersecurity \'Rethink\' (lien direct) |
With twice as much malware now targeting Macs, IT pros need to scramble to adapt to a large, and likely permanent, work-from-home population, experts say. |
Malware
|
|
|
|
2020-09-24 18:40:00 |
Malware Attacks Declined But Became More Evasive in Q2 (lien direct) |
Most of the malware used in attacks last quarter were designed to evade signature-based detection tools, WatchGuard says. |
Malware
|
|
|
|
2020-09-17 17:10:00 |
Iranian Hackers Indicted for Stealing Aerospace & Satellite Tracking Data (lien direct) |
Also, the US Treasury sanctioned Iranian attack group APT39 following a years-long malware campaign. |
Malware
Prediction
|
APT 39
|
|
|
2020-09-10 10:00:00 |
Ripple20 Malware Highlights Industrial Security Challenges (lien direct) |
Poor security practices allowed software vulnerabilities to propagate throughout industrial and IoT products for more than 20 years. |
Malware
|
|
|
|
2020-09-03 14:15:00 |
New Email-Based Malware Campaigns Target Businesses (lien direct) |
Researchers who found "Salfram" say its campaigns use the same crypter to distribute payloads, including ZLoader, SmokeLoader, and AveMaria. |
Malware
|
|
|
|
2020-09-02 13:30:00 |
\'KryptoCibule\' Uses Several Tricks to Maximize Cryptocurrency Theft (lien direct) |
The malware family uses multiple tactics to steal as much cryptocurrency as possible while flying under the radar. |
Malware
|
|
|
|
2020-09-01 15:45:00 |
Apple Signs Shlayer, Legitimizes Malware (lien direct) |
Shlayer, a common macOS Trojan, received Apple's notary certification and place in the App Store -- twice. |
Malware
|
|
|