Microsoft discloses malware attack on Ukraine govt networks Tech and Gaming Blog Technology by noreply@blogger.com (Unknown) - January 16, 20220 In this undated handout photo released by Ukrainian Foreign Ministry Press Service, the building of Ukrainian Foreign Ministry is seen during snowfall in Kyiv, Ukraine. Ukrainian officials and media reports say a number of government websites in Ukraine are down after a massive hacking attack. While it is not immediately
Beware of fake Telegram Messenger App Hacking PCs with Purple Fox Malware Tech and Gaming Blog Technology by noreply@blogger.com (Unknown) - January 4, 20220 The Telegram messaging app Trojan installers are used to deploy the Windows-based Purple Fox backdoor to compromised systems. That's according to new research published by Minerva Labs, which describes the attack as different from intruders that typically exploit legitimate software to release malicious payloads. "This threat actor was able to keep
RedLine Malware alert! Your accounts and passwords saved on Chrome or Edge might be hacked. Know how to check Tech and Gaming Blog Technology by noreply@blogger.com (Unknown) - January 2, 20220 Hackers can steal your Google Chrome or Microsoft Edge login password through malware, experts say. Saving the Google Chrome or Microsoft Edge login password in these internet browsers is a pretty common practice. Most of us save passwords in Chrome or Edge for convenient logging in next time. They are generally considered
New Flagpro malware linked to Chinese state-backed hackers Tech and Gaming Blog Technology by noreply@blogger.com (Unknown) - December 29, 20210 The cyber espionage group APT (Advanced Persistent Threat) Blackwell has been targeting Japanese companies with a new type of malware that researchers call "Flag pro". Second level malware and run it. Breaching corporate networksThe chain of infection begins with a phishing e-mail that was developed for the target organization and pretends
Attackers Behind Trickbot Expanding Malware Distribution Channels Tech and Gaming Blog Technology by noreply@blogger.com (Unknown) - October 16, 20210 The operators behind the pernicious TrickBot malware have resurfaced with new tricks that aim to increase its foothold by expanding its distribution channels, ultimately leading to the deployment of ransomware such as Conti.The threat actor, tracked under the monikers ITG23 and Wizard Spider, has been found to partner with other
Can machine learning help detect zero day malware? Data Breach by Derek B. Johnson - June 11, 20210 University of College London campus. Researchers identified a number of promising machine learning techniques that may help improve detection of untracked or zero day malware. (University College of London) An academic-private sector partnership reported favorable results from research exploring how machine learning models could be used to improve static malware analysis
‘Nameless’ malware attacks 1.2TB database in the cloud Data Breach by Steve Zurier - June 10, 20210 a so-called “nameless” undetected malware stole a database in the cloud that contained some 1.2 terabytes of files, cookies, and credentials that came from 3.2 million Windows-based computers. (Photo by Drew Angerer/Getty Images) Researchers on Wednesday said a so-called “nameless” undetected malware stole a database in the cloud that contained some
New Siloscape malware targets Windows containers and highlights security pitfalls Data Breach by Derek B. Johnson - June 7, 20210 A visitor photographs a symbol of a cloud at the Deutsche Telekom stand the day before the CeBIT technology trade fair. Researchers have discovered what they believe is the first malware strain developed to target Windows containers. (Sean Gallup/Getty Images) Researchers at Palo Alto Unit 42 have discovered what they think
Malware used zero-day exploit to take screenshots of victims’ Macs Data Breach by Bradley Barth - May 26, 20210 An Apple Store in Hong Kong. (ChIfcapsho, CC BY-SA 3.0 https://creativecommons.org/licenses/by-sa/3.0, via Wikimedia Commons) Apple patched a vulnerability that was actively exploited by malware actors to bypass the Transparency Consent and Control (TCC) framework, allowing them to take screenshots of infected victims’ computer desktops without having to even trick them into
Malware caught using a macOS zero-day to secretly take screenshots Tech and Gaming Blog Technology by Zack Whittaker - May 24, 20210 Almost exactly a month ago, researchers revealed a notorious malware family was exploiting a never-before-seen vulnerability that let it bypass macOS security defenses and run unimpeded. Now, some of the same researchers say another malware can sneak onto macOS systems, thanks to another vulnerability. Jamf says it found evidence that the XCSSET