Fake Chrome & Firefox browser update lead users to malware infection

By Waqas
Another day, another malware scam – This one uses Chrome
This is a post from HackRead.com Read the original post: Fake Chrome & Firefox browser update lead users to malware infection
Continue reading Fake Chrome & Firefox browser update lead users to malware infection

XMRig: Father Zeus of Cryptocurrency Mining Malware?

XMRig is popular among cybercriminals because it is open source, meaning threat actors can make relatively simple changes to its code to convert the tool into a cryptojacking mechanism.

The post XMRig: Father Zeus of Cryptocurrency Mining Malware? appeared first on Security Intelligence.

Continue reading XMRig: Father Zeus of Cryptocurrency Mining Malware?

Drinkman and Smilianets Sentenced: The End to Our Longest Databreach Saga?

On Thursday, February 15, 2018, we may have finally reached the end of the Albert Gonzalez Databreach Saga.  Vladimir Drinkman, age 37, was sentenced to 144 months in prison, after pleading guilty before U.S. District Judge Jerome Simandle in New… Continue reading Drinkman and Smilianets Sentenced: The End to Our Longest Databreach Saga?

A banking trojan that steals Gmail, Facebook, Twitter and Yahoo Password

By Waqas
The IT security researchers at Bitdefender have discovered a banking malware
This is a post from HackRead.com Read the original post: A banking trojan that steals Gmail, Facebook, Twitter and Yahoo Password
Continue reading A banking trojan that steals Gmail, Facebook, Twitter and Yahoo Password

Google Search Results Exploited to Distribute Zeus Panda Banking Trojan

By Waqas
Until now, we believed that to advertise and promote your
This is a post from HackRead.com Read the original post: Google Search Results Exploited to Distribute Zeus Panda Banking Trojan
Continue reading Google Search Results Exploited to Distribute Zeus Panda Banking Trojan

Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links

Security researchers have identified a new phishing campaign launched by Russian cyberespionage group Fancy Bear that uses rogue blogspot.com URLs to bypass spam filters. These latest attacks were aimed at Bellingcat, a group of volunteers who perform … Continue reading Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links

Diving Into Zberp’s Unconventional Process Injection Technique

IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.

The post Diving Into Zberp’s Unconventional Process Injection Technique appeared first on Security Intelligence.

Continue reading Diving Into Zberp’s Unconventional Process Injection Technique

Diving Into Zberp’s Unconventional Process Injection Technique

IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.

The post Diving Into Zberp’s Unconventional Process Injection Technique appeared first on Security Intelligence.

Continue reading Diving Into Zberp’s Unconventional Process Injection Technique