New Shlayer Malware Variant Targeting Macs

Security researchers have found a new variant of a trojan program dubbed Shlayer that infects Mac computers and disables the macOS Gatekeeper security agent. Shlayer was discovered a year ago by researchers from Intego and was typically distributed th… Continue reading New Shlayer Malware Variant Targeting Macs

Trojan Infects Browser Extensions After Disabling Integrity Checks

Security researchers have discovered a new Trojan program dubbed Razy that installs itself as a browser extension or infects existing browser extensions after disabling integrity checks. According to researchers from Kaspersky Lab, Razy is distributed… Continue reading Trojan Infects Browser Extensions After Disabling Integrity Checks

Email Spam Campaign Targets U.S. Retail, Restaurant Sectors

A cybercriminal group has launched a malware campaign via personalized spear-phishing emails against large retail, restaurant and grocery chains in the United States, as well as against other organizations from the food and beverage industries. The sp… Continue reading Email Spam Campaign Targets U.S. Retail, Restaurant Sectors

APT28 Pulls Out New Malware Cannon

The notorious Russian cyberespionage group known as APT28, Fancy Bear and Sofacy is targeting government organizations using a new Trojan program called Cannon. Researchers from Palo Alto Networks detected new spear-phishing campaigns from APT28 at th… Continue reading APT28 Pulls Out New Malware Cannon

Spyware Pushers Modify Equation Editor Exploit to Bypass AV Detection

In a case that shows you can teach an old exploit new tricks, a group of attackers who push information-stealing malware modified a well-known exploit in a way that it bypasses detection by most antivirus programs. The incident was reported by researc… Continue reading Spyware Pushers Modify Equation Editor Exploit to Bypass AV Detection

Cyberespionage Campaign in Ukraine Uses Free and Custom RATs

Security researchers have been tracking a sustained cyberespionage campaign against Ukrainian government institutions that uses a combination of free and custom-made remote access Trojans (RATs). The malware programs involved in the years-long campaig… Continue reading Cyberespionage Campaign in Ukraine Uses Free and Custom RATs