You searched for cyber | SC Media

Your search for cyber returned 132 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Malware remove
Post remove
Malware remove

Your search for cyber returned 132 results

Sort Results:

Relevant Recent
APTs/cyberespionage, Cybercrime, Featured, Malware, Security News

Threat hunters watch as Chinese hackers forage forums for tools

Mike McLellan, senior security researcher at Secureworks, talks about the discovery and investigation of one recent Chinese attack campaign that revealed how nation-state actors will leverage any code at their disposal.
APTs/cyberespionage, Cybercrime, Government, Government/Defense, IoT, Malware, Security News

U.S. urges Linux users to secure kernels from new Russian malware threat

Linux users should not assume they are safe from the ambitions and reach of reputed Russian hacking group Fancy Bear, which has been using a newly disclosed malware toolset to establish a command-and-control connection with infected Linux systems. Called Drovorub, the toolset essentially creates a backdoor that enables file downloads and uploads, the execution of…
APTs/cyberespionage, Cybercrime, Data Breach, Malware, Ransomware, Security News

Dacls RAT’s goals are to steal customer data and spread ransomware

The Dacls remote access trojan that is capable of attacking Windows, Linux and macOS environments has been used to distribute VHD ransomware and to target customer databases for attempted exfiltration, according to researchers. Kaspersky on Wednesday revealed this latest intel on Dacls in a company blog post and corresponding press release that also detailed an…
APTs/cyberespionage, Cybercrime, Finance, Malware, Security News

‘GoldenSpy’ tax software campaign tries to erase evidence of malware

The actors behind a campaign to spread GoldenSpy malware via tax accounting software used by customers of a Chinese bank have recently attempted to distribute an uninstaller that deletes the backdoor in an apparent attempt to cover up their illicit activities. In a previous company blog post and threat report, Trustwave and its SpiderLabs team identified the accounting software…
APTs/cyberespionage, Cybercrime, Finance, Malware, Security News

Tax software used by Chinese bank clients installs GoldenSpy backdoor

A tax software program installed by business clients of an unidentified Chinese bank was trojanized with malware that installs a backdoor granting attackers SYSTEM-level privileges, researchers warn. In a company blog post and more detailed threat report, Trustwave and its SpiderLabs team identified the accounting software as Intelligent Tax, which was reportedly developed by the…
Events, InfoSec World 2020, Malware, Network Security, Phishing, Security News

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

“Two can play at this game…” Cybersecurity is a non-stop arms race between white hats and malicious hackers, and the three “A’s” — automation, analytics and artificial intelligence — are among the more powerful defensive tools that CISOs can implement to defend their organizations. But cybercriminals can also potentially employ them to magnify their attacks…
APTs/cyberespionage, Cybercrime, Malware, Phishing, Security News

Cyber snoops targeted aerospace, defense employees with fake job offers on LinkedIn

A cyber espionage operation used fake job offers, sent via LinkedIn messages, to target employees at aerospace and military companies in Europe and the Middle East late last year, researchers from ESET have reported. The highly targeted campaign — dubbed Operation In(ter)ception (an allusion to one malware sample’s file name) — took place from September…
APTs/cyberespionage, Cybercrime, Malware, Security News

Ramsay spy framework built to subvert air-gapped defenses

Air-gapped networks aren’t easily compromised, but they don’t offer perfectly air-tight security either. Leveraging insider threats, infecting flash drives and other removable media, and conducting side-channel attacks are all techniques malicious actors can employ to spread malware to isolated systems. Indeed, researchers at ESET are reporting the discovery of a new cyber espionage framework designed…
Next post in Cybercrime