Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 5 / 15
296 résultats taggé malware  ✕
New Medusa malware variants target Android users in seven countries https://www.bleepingcomputer.com/news/security/new-medusa-malware-variants-target-android-users-in-seven-countries/
30/06/2024 11:40:32
QRCode
archive.org
thumbnail

The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in campaigns targeting France, Italy, the United States, Canada, Spain, the United Kingdom, and Turkey.

bleepingcomputer EN 2024 Android Banking-Trojan Malware Medusa Mobile Smishing
South Korean telecom company attacks torrent users with malware — over 600,000 customers report missing files, strange folders, and disabled PCs https://www.tomshardware.com/tech-industry/cyber-security/south-korean-telecom-company-attacks-torrent-users-with-malware-over-600000-people-report-missing-files-strange-folders-and-disabled-pcs
27/06/2024 14:26:33
QRCode
archive.org
thumbnail

Korean telecom company KT Corporation sent malware to its subscribers who use Webhard's Grid Service peer-to-peer sharing program to hide their files and stop them from using the service.

tomshardware EN 2024 South-Korea KTCorporation torrent malware
XZ backdoor behavior inside OpenSSH https://securelist.com/xz-backdoor-part-3-hooking-ssh/113007/
24/06/2024 16:44:07
QRCode
archive.org
thumbnail

In this article, we analyze XZ backdoor behavior inside OpenSSH, after it has achieved RSA-related function hook.

securelist EN 2024 Backdoor Cyber-espionage Linux Malware Malware-Descriptions Malware-Technologies SSH Targeted-attacks XZ
Rafel RAT, Android Malware from Espionage to Ransomware Operations https://research.checkpoint.com/2024/rafel-rat-android-malware-from-espionage-to-ransomware-operations/
24/06/2024 08:51:05
QRCode
archive.org
thumbnail

Android, Google’s most popular mobile operating system, powers billions of smartphones and tablets globally. Known for its open-source nature and flexibility, Android offers users a wide array of features, customization options, and access to a vast ecosystem of applications through the Google Play Store and other sources.

However, with its widespread adoption and open environment comes the risk of malicious activity. Android malware, a malicious software designed to target Android devices, poses a significant threat to users’ privacy, security, and data integrity. These malicious programs come in various forms, including viruses, Trojans, ransomware, spyware, and adware, and they can infiltrate devices through multiple vectors, such as app downloads, malicious websites, phishing attacks, and even system vulnerabilities.

checkpoint EN 2024 Rafel RAT Android Malware Ransomware Operations
PikaBot: a Guide to its Deep Secrets and Operations - Sekoia.io Blog https://blog.sekoia.io/pikabot-a-guide-to-its-deep-secrets-and-operations/
04/06/2024 11:15:28
QRCode
archive.org
thumbnail

Uncover an in-depth analysis of PikaBot, a malware loader used by Initial Access Brokers for network compromise and ransomware deployment.

sekoia EN 2024 PikaBot malware analysis TA577 BlackBasta
Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities https://thehackernews.com/2024/05/researchers-uncover-active-exploitation.html?m=1
30/05/2024 16:30:28
QRCode
archive.org

Researchers have discovered several vulnerabilities in popular WordPress plugins that allow attackers to create rogue admin accounts.
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

thehackernews EN 2024 WordPress Plugin Vulnerabilities
macOS version of elusive 'LightSpy' spyware tool discovered https://www.bleepingcomputer.com/news/security/macos-version-of-elusive-lightspy-spyware-tool-discovered/
30/05/2024 12:05:37
QRCode
archive.org
thumbnail

A macOS version of the LightSpy surveillance framework has been discovered, confirming the extensive reach of a tool only previously known for targeting Android and iOS devices.

bleepingcomputer EN 2024 Apple LightSpy Malware Spyware
How ransomware abuses BitLocker | Securelist https://securelist.com/ransomware-abuses-bitlocker/112643/
25/05/2024 19:12:04
QRCode
archive.org
thumbnail

The Kaspersky GERT has detected a VBS script that has been abusing Microsoft Windows features by modifying the system to lower the defenses and using the local MS BitLocker utility to encrypt entire drives and demand a ransom.
#BitLocker #Data #Descriptions #Encryption #Incident #Malware #Microsoft #Ransomware #Technologies #Windows #response

Descriptions Incident BitLocker Microsoft Windows Encryption Ransomware Malware response Data Technologies
Russian hackers use new Lunar malware to breach a European govt's agencies https://www.bleepingcomputer.com/news/security/russian-hackers-use-new-lunar-malware-to-breach-a-european-govts-agencies/#google_vignette
17/05/2024 09:25:27
QRCode
archive.org
thumbnail

Security researchers discovered two previously unseen backdoors dubbed LunarWeb and LunarMail that were used to compromise a European government's diplomatic institutions abroad.

bleepingcomputer EN 2024 APT Lunar LunarMail LunarWeb Malware Turla
Log4j Exploited by XMRig Cryptominer Malware: Analysis & Mitigation https://www.uptycs.com/blog/log4j-campaign-xmrig-malware
16/05/2024 16:56:08
QRCode
archive.org
thumbnail

Learn how the Log4j vulnerability (CVE-2021-44228) is exploited by XMRig cryptominer malware. Discover attack methods, indicators, and effective mitigation strategies.

uptycs EN 2024 Log4j XMRig Cryptominer Malware CVE-2021-44228
An Infostealer's Brewin': Cuckoo & AtomicStealer Get Creative https://alden.io/posts/infostealers-a-brewin/
15/05/2024 20:54:08
QRCode
archive.org
thumbnail

Recent infostealer malware campaign utilizing fake Homebrew websites to deliver Cuckoo and AtomicStealer.

alden EN 2024 macOS Malware RE CTI AMOS Infostealer Homebrew
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign https://thehackernews.com/2024/05/kremlin-backed-apt28-targets-polish.html?m=1
12/05/2024 13:08:34
QRCode
archive.org

Russia-Linked APT28 Strikes Poland with Malware Campaign Polish government bodies were hit by a sophisticated malware attack orchestrated by the infam

thehackernews EN 2024 APT28 Poland Malware
Eight Arms to Hold You: The Cuttlefish Malware https://blog.lumen.com/eight-arms-to-hold-you-the-cuttlefish-malware/?ref=news.risky.biz
03/05/2024 07:43:56
QRCode
archive.org
thumbnail

Executive Summary: The Black Lotus Labs team at Lumen Technologies is tracking a malware platform we’ve named Cuttlefish, that targets networking equipment, specifically enterprise-grade small office/home office (SOHO) routers. This malware is modular, designed primarily to steal authentication material found in web requests that transit the router from the adjacent local area network (LAN). A

lumen EN 2024 Cuttlefish Malware SOHO routers DNS-hijacking sniffing iot
Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams https://jfrog.com/blog/attacks-on-docker-with-millions-of-malicious-repositories-spread-malware-and-phishing-scams/
01/05/2024 09:38:21
QRCode
archive.org
thumbnail

Attackers are using Docker Hub for malicious campaigns of various types, including spreading malware, phishing and scams. Read the analysis of 3 malware campaigns.

jfrog EN 2024 Docker Hub Repositories Malware Phishing
Leaked LockBit builder in a real-life incident response case | Securelist https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/
16/04/2024 14:24:13
QRCode
archive.org
thumbnail

Kaspersky researchers revisit the leaked LockBit 3.0 builder and share insights into a real-life incident involving a custom targeted ransomware variant created with this builder.

securelist EN 2024 builder Data-Encryption Incident-response LockBit Malware Malware-Technologies Ransomware Targeted-attacks Trojan
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files https://thehackernews.com/2024/04/raspberry-robin-returns-new-malware.html?m=1
14/04/2024 15:30:37
QRCode
archive.org

Researchers uncover a fresh wave of the Raspberry Robin campaign spreading malware through malicious Windows Script Files (WSFs) since March 2024.
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

thehackernews 2024 EN Raspberry-Robin WSF return
Kaspersky analysis of the backdoor in XZ https://securelist.com/xz-backdoor-story-part-1/112354/
13/04/2024 03:32:39
QRCode
archive.org
thumbnail

Kaspersky analysis of the backdoor recently found in XZ, which is used in many popular Linux distributions and in OpenSSH server process.

securelist EN 2024 Backdoor Cyber-espionage Linux Malware analysis Malware-Descriptions Malware-Technologies SSH XZ
Distinctive Campaign Evolution of Pikabot Malware https://www.mcafee.com/blogs/other-blogs/mcafee-labs/distinctive-campaign-evolution-of-pikabot-malware/
05/04/2024 09:10:00
QRCode
archive.org
thumbnail

Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular design is comprised of a

mcafee EN 2024 analysis Pikabot Malware
North Korea’s Post-Infection Python Payloads – One Night in Norfolk https://norfolkinfosec.com/north-koreas-post-infection-python-payloads/
04/04/2024 13:29:13
QRCode
archive.org

Throughout the past few months, several publications have written about a North Korean threat actor group’s use of NPM packages to deploy malware to developers and other unsuspecting victims. This blog post provides additional details regarding the second and third-stage malware in these attacks, which these publications have only covered in limited detail.

norfolkinfosec EN 2024 NPM packages Phlyum malware North-Korea phyton payloads
Threat Actors Deliver Malware via YouTube Video Game Cracks https://www.proofpoint.com/uk/blog/threat-insight/threat-actors-deliver-malware-youtube-video-game-cracks
03/04/2024 22:58:20
QRCode
archive.org
thumbnail

Key takeaways  Proofpoint identified multiple YouTube channels distributing malware by promoting cracked and pirated video games and related content.  The video descriptions include links leading t...

proofpoint EN 2024 Malware YouTube Video Game Cracks
page 5 / 15
4259 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio