QR-Code Phishing has multiplied: How detection helps security teams winJoshua KamdjouDecember 8, 2023
Why software teams have to change their focus from vulnerabilities to malwareMatt RoseOctober 2, 2023
Bad bots are growing in volume and sophistication – here’s what to do about itKarl Triebes July 6, 2023
Fake Google Update and Microsoft One Drive binaries used in malicious attacksSC StaffDecember 4, 2023
MalwareTrojan-proxy based on macOS piggybacks on cracked softwareSteve ZurierDecember 8, 2023Security researchers say the emergence of the macOS trojan-proxy shows that all operating systems are under attack as hackers don't discriminate.
Vulnerability ManagementSurprise Cam Nudes, Staples, Turtle, Apple, 23andme, P2Pinfect, Gmail, Jason Woods – SWN #346December 5, 2023Surprise Cam Nudes, Staples, Turtle, Apple, 23andme, P2Pinfect, Sellafield, Gmail, Jason Wood, and more on this edition of the Security Weekly News.
MalwareMIPS chips targeted by new P2Pinfect malware in Redis server and IoT-based attacksSteve ZurierDecember 4, 2023The move by the threat actors to attack 32-bit MIPS processors reflects an attempt to propagate the P2Pinfect malware to a broader range of targets.
MalwareChimera, Aliquippa, FNF, Lazarus, DARPA, Namedrop, Google, Aaran Leyland, and More – SWN #344November 28, 2023Chimera, Aliquippa, FNF, Lazarus, DARPA, Ransom Payments, Namedrop, Google, Aaran Leyland, and more are on this edition of the Security Weekly News.
RansomwareNew Phobos ransomware variant impersonates VX-Underground malware-sharing groupLaura FrenchNovember 22, 2023VX-Underground told SC Media the attempted frame-job would likely have little impact except to “make us look like jerks.”
Cloud SecurityKinsing malware exploits critical Apache ActiveMQ flaw to mine cryptoSteve ZurierNovember 21, 2023Earlier this month it was Looney Tunables, now Kinsing launched attacks on Apache ActiveMQ to infect systems with malware and cryptominers.
MalwareLummaC2 4.0 infostealer uses trigonometry to avoid sandboxesSteve ZurierNovember 20, 2023Outpost24 researchers expect LummaC2 4.0 malware to evolve with improved obfuscation techniques and updates to its control panel.
Vulnerability ManagementCashwarp vs. Reptar, Rackspace, BlackCat, Bots, Aaran Leyland and More – SWN #343November 17, 2023Cashwarp vs. Reptar, Rackspace, BlackCat, Intel, AMD, Bots and more bots, Aaran Leyland, and More News on the Security Weekly News.