FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware
The Clop ransomware has become a tool of choice for the financially motivated group. Continue reading FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware
Collaborate Disseminate
The Clop ransomware has become a tool of choice for the financially motivated group. Continue reading FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware
There were 11 critical bugs and six that were unpatched but publicly known in this month’s regularly scheduled Microsoft updates. Continue reading October Patch Tuesday: Microsoft Patches Critical, Wormable RCE Bug
The streaming box allows arbitrary code execution as root, paving the way to pilfering social-media tokens, passwords, messaging history and more. Continue reading Authentication Bug Opens Android Smart-TV Box to Data Theft
Microsoft and partners went after the botnet using a copyright infringement tactic and hunting down C2 servers. Continue reading TrickBot Takedown Disrupts Major Crimeware Apparatus
The malware also has a unique machine-learning module. Continue reading Sophisticated Android Ransomware Executes with the Home Button
The P2P malware is infecting any and all types of endpoints via brute-forcing, with 10 versions targeting desktops, laptops, mobile and IoT devices. Continue reading HEH P2P Botnet Sports Dangerous Wiper Function
The newly discovered APT specializes in espionage campaigns against industrial holdings — a rare target for spyware. Continue reading MontysThree APT Takes Unusual Aim at Industrial Targets
Researchers uncovered a sophisticated, incredibly well-resourced APT that has its fingers in wide-ranging espionage and disinformation campaigns. Continue reading BAHAMUT Spies-for-Hire Linked to Extensive Nation-State Activity
The upcoming deadlines for applying for coronavirus relief are the lure for a phish that gets around email security gateways by using a legitimate SharePoint page for data-harvesting. Continue reading IRS COVID-19 Relief Payment Deadlines Anchor Convincing Phish
Smart sex toy vulnerable to hacks, researchers say — which could expose users’ most sensitive bits (of data) to cybercriminals. Continue reading Male Chastity Device Comes with Massive Security Flaws