Xenomorph Android malware now targets U.S. banks and crypto wallets

Xenomorph Android malware now targets U.S. banks and crypto wallets

Security researchers discovered a new campaign that distributes a new version of the Xenomorph malware to Android users in the United States, Canada, Spain, Italy, Portugal, and Belgium. Analysts at cybersecurity company ThreatFabric have been tracking Xenomorph activity since February 2022 and note that the new campaign launched in mid-August. The latest version of Xenomorph is targeting users […]

Xenomorph Android malware now targets U.S. banks and crypto wallets Read More »

Chatbots lower the barrier for entry into cybercrime

Chatbots lower the barrier for entry into cybercrime

The potential risk posed by AI/chatbots in cybercrime has dominated headlines recently. A new report considers how these tools are leveraged to create highly targeted phishing campaigns.   Egress, a cybersecurity company providing intelligent email security, has released its second Phishing Threat Trends Report. The report’s findings demonstrate the evolving attack methodologies used by cybercriminals that

Chatbots lower the barrier for entry into cybercrime Read More »

Ransomware acting within 24 hours of access now: Secureworks report

Ransomware Deployment Speed 24 hours of access now: Secureworks report

Rapid Ransomware Threats Demand Swift Action The latest Secureworks Threat Report highlights a startling fact: Ransomware can compromise systems in under 24 hours. Cybercriminals are advancing quickly, with half of ransomware attacks occurring on the day of initial access. Global Cyberthreats Evolve Secureworks’ Counter Threat Unit pinpoints the growth of “name and shame” tactics, where

Ransomware Deployment Speed 24 hours of access now: Secureworks report Read More »

NSA and CISA reveal top 10 cybersecurity misconfigurations

NSA and CISA reveal top 10 cybersecurity misconfigurations

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) revealed today the top ten most common cybersecurity misconfigurations discovered by their red and blue teams in the networks of large organizations. Today’s advisory also details what tactics, techniques, and procedures (TTPs) threat actors use to successfully exploit these misconfigurations with various

NSA and CISA reveal top 10 cybersecurity misconfigurations Read More »

New BunnyLoader threat emerges as a feature-rich malware-as-a-service

New BunnyLoader threat emerges as a feature-rich malware-as-a-service

Security researchers discovered a new malware-as-a-service (MaaS) named ‘BunnyLoader’ advertised on multiple hacker forums as a fileless loader that can steal and replace the contents of the system clipboard. The malware is under rapid development, with updates adding new features and bug fixes. It can currently download and execute payloads, log keys, steal sensitive data

New BunnyLoader threat emerges as a feature-rich malware-as-a-service Read More »

AI-assisted cybersecurity: 3 key components you can't ignore | VentureBeat

Microsoft’s Bing AI Faces Malware Threat From Deceptive Ads – Infosecurity Magazine

Microsoft’s Bing Chat has come under scrutiny due to a significant security concern – the infiltration of malicious ads. Malwarebytes researchers have now demonstrated how unsuspecting users seeking software downloads can be tricked into visiting malicious websites and unwittingly downloading malware. Bing Chat, an artificial intelligence (AI) interactive text and image application powered by OpenAI’s

Microsoft’s Bing AI Faces Malware Threat From Deceptive Ads – Infosecurity Magazine Read More »

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World

October is a month known for many things: the change of seasons, the approach of Halloween, and, importantly, Cybersecurity Awareness Month. This year is especially momentous as it marks the 20th annual Cybersecurity Awareness Month, a collaborative effort launched by the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA). The Origin

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World Read More »

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection Introduction Organisations must take a multifaceted approach to secure their digital assets in an era of rapidly evolving cyber threats. This comprehensive article delves deep into the labyrinth of infrastructure security, examining its various components: the software layer, the hardware layer, and advanced security

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection Read More »

Strategies For Merchant Ransomware Protection

Merchant Ransomware Protection Strategies For Merchant Ransomware Protection

Ransomware attacks have become a significant threat to businesses of all sizes, including merchants who rely on electronic payment systems for their operations. These malicious attacks can lock you out of your critical systems, encrypt your data, and demand a hefty ransom in exchange for the decryption key. To safeguard your business and customer data,

Merchant Ransomware Protection Strategies For Merchant Ransomware Protection Read More »

Ransomware attacks down in August after record levels in July

Ransomware attacks down in August after record levels in July

August 2023 saw a drop in ransomware attacks, according to NCC Group’s August Threat Pulse, with 390 attacks representing a 22% drop from July.  It comes after back-to-back record months in June and July, largely the result of Cl0ps MOVEit exploitation and the ongoing impact of the attack.  Lockbit 3.0 back in the top spot

Ransomware attacks down in August after record levels in July Read More »

Scroll to Top