MacOS malware hits cryptocurrency investors on Slack and Discord
Security researchers have discovered new malware targeting Mac owners discussing cryptocurrencies on Slack and Discord chat websites.
Security researchers have discovered new malware targeting Mac owners discussing cryptocurrencies on Slack and Discord chat websites.
Scientists have devised a way to defeat the Meltdown and Spectre security vulnerabilities caused by speculative execution in modern processors.
According to a blog post by Barkly, instead of using Word documents or other commonly abused attachment types, these new spam email campaigns are using .iqy files — these are simple text files that open by default in Excel and are used to download data from the Internet. This approach can bypass antivirus software and…
The botnet operators behind IcedID and Trickbot are collaborating with each other and possibly sharing their ill-gotten gains, according to security researchers.
Research finds that unsecured servers should not have been connected to the internet. Three-quarters of open Redis servers are infected with malware, according to new research.
Vulnerability patched in Git source code versioning software. Security researchers have discovered a number of flaws in Git that could have enabled hackers to run remote code on a victim’s PC.
Business email compromise still most popular and most effective attack vector. The bulk of email fraud gangs still operate out of Nigeria, according to new research.
Increasing value of cryptocurrency sees hackers look out for mining hardware. Security researchers have discovered a large Satori botnet that is scanning the internet for exposed Ethereum cryptocurrency mining rigs.
Ransomware is under development that gives victims 10 minutes to enter a code and will delete the contents of a hard drive in the event of failure. According to MalwareHunterTeam, who discovered the malware, when the malware is run, it plays the Soviet national anthem, which is copied to the %UserProfile%AppDataLocal As an mp3 file. …
Security researhcers have discovered a new form of the Hide and Seek IoT malware. The latest version can now survive a reboot of the infected device.