Cybersecurity threats and cybercrime trends of 2020

Bitdefender released a report revealing top cybersecurity threats, frequency of threats and cybercrime trends of 2020. “Our 2020 findings depict consumers under constant assault from cybercriminals looking to capitalize on fear and societal uncer… Continue reading Cybersecurity threats and cybercrime trends of 2020

Cloud-native watering hole attack: Simple and potentially devastating

In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that hover near sources of water favored by their prey, attackers systematically infect websites likely to be visited … Continue reading Cloud-native watering hole attack: Simple and potentially devastating

Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT

Fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019, according to WatchGuard. Q4 2020 also brought a 41% increase in encrypted malware detect… Continue reading Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT

New malware “BlackRock” disguised as Android Clubhouse app

By Habiba Rashid
According to researchers, the fake website with malware app looks as real as it gets. It is “a well-executed copy of the legitimate Clubhouse website.”
This is a post from HackRead.com Read the original post: New malware “BlackRock” di… Continue reading New malware “BlackRock” disguised as Android Clubhouse app

New phishing campaign targets taxpayer credentials

A new phishing campaign is targeting U.S. taxpayers with documents that purport to contain tax-related content, but ultimately deliver NetWire and Remcos malware – two prolific remote access trojans (RATs) which allows attackers to take control o… Continue reading New phishing campaign targets taxpayer credentials

Years-old MS Office, Word flaws most exploited to deliver malware

29% of malware captured was previously unknown – due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection, according to a HP report. 88% of malware was delivered by email into users’ inboxes, in many cases… Continue reading Years-old MS Office, Word flaws most exploited to deliver malware

How does the government install a trojan horse on somebody’s mobile phone?

I am reading a news article (in italian) in which the police snooped on the Dean of a university by a trojan horse that the police had installed on his mobile phone.
In particular, the trojan horse transmitted face-to-face conversations (I… Continue reading How does the government install a trojan horse on somebody’s mobile phone?

Good old malware for the new Apple Silicon platform

As we observe a growing interest in the newly released Apple Silicon platform from malware adversaries, this inevitably leads us to new malware samples compiled for it. In this article, we are going to take a look at threats for Macs with the Apple M1 chip on board. Continue reading Good old malware for the new Apple Silicon platform