cybersecurity news daily
-
Threats
Forced Chrome extensions get removed, keep reappearing
Malwarebytes found a family of forced Chrome extensions that can’t be removed because of a policy change that tells users…
-
Threats
ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
A review of what’s changed in malware in 2022, and what hasn’t, based on Adam Kujawa’s talk at RSAC 2022.…
-
Threats
Credential-stealing malware disguises itself as Telegram, targets social media users
Spyware.FFDroider is an information stealer that exfiltrates browser data in an attempt to steal credentials and valid session cookies. A…
-
Threats
Don’t let scammers ruin your Valentine’s Day
No matter the occasion, you can always count on scammers to show up. Today is Valentine’s Day, so we thought…
-
Threats
SolarWinds attackers launch new campaign
The Microsoft Threat Intelligence Center has issued a warning about new activities from Nobelium, the group behind SolarWinds, Sunburst, and…
-
Threats
Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
Threat Research Blog Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise June 16, 2021 | by Tyler McLellan, Robert…
-
Threats
The UNC2529 Triple Double: A Trifecta Phishing Campaign
In December 2020, Mandiant observed a widespread, global phishing campaign targeting numerous organizations across an array of industries. Mandiant tracks…
-
Malware Analysis
How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
By Gabor Szathmari One interesting offshoot of researching .gov.au websites running outside Australia was an odd service running from Russia. How the Service…
-
Threats
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
Mandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being…
-
Threats
Abusing Replication: Stealing AD FS Secrets Over the Network
Organizations are increasingly adopting cloud-based services such as Microsoft 365 to host applications and data. Sophisticated threat actors are catching…
- 1
- 2