Zoom Zero-Day Bug Opens Mac Users to Webcam Hijacking
The vulnerability can be exploited on a drive-by basis by a malicious website. Continue reading Zoom Zero-Day Bug Opens Mac Users to Webcam Hijacking
Collaborate Disseminate
The vulnerability can be exploited on a drive-by basis by a malicious website. Continue reading Zoom Zero-Day Bug Opens Mac Users to Webcam Hijacking
From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.
Categories:
Cybercrime
Tags: coin minerscoin-haveCoinbasecoi… Continue reading The state of malicious cryptomining
This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Categories:
Threat analysis
Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe… Continue reading Drive-by download campaign targets Chinese websites, experiments with exploits
This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Categories:
Threat analysis
Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe… Continue reading Drive-by download campaign targets Chinese websites, experiments with exploits
Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.
Categories:
Threat analysis
Tags: AndroidBotCAPTCHAcoinhivecrypto miningcryptominingdrive-by
(Read more…)
The post… Continue reading Drive-by cryptomining campaign targets millions of Android users
Publicly known “magic string” lets any site run malicious code, no questions asked. Continue reading Cisco’s WebEx Chrome plugin opens 20 million users to drive-by attacks