Hello again, FakeBat: popular loader returns after months-long hiatus
The web browser, and search engines in particular, continue to be a popular entry point to deliver malware to users. While we noted a decrease…
The web browser, and search engines in particular, continue to be a popular entry point to deliver malware to users. While we noted a decrease…
Texas oilfield supplier Newpark Resources suffered a ransomware attack Pierluigi Paganini November 08, 2024 Texas oilfield supplier Newpark Resources suffered a ransomware attack that disrupted…
Nov 08, 2024Ravie LakshmananMalware / Virtualization Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a…
The UK government has committed to resolving the fallout from a controversial, retroactive UK tax policy that has left thousands of IT contractors living under…
Google has left Android users puzzled after the most recent update to the Google mobile app causes links shared from the app to now be…
Nov 08, 2024The Hacker NewsCyber Resilience / Compliance We’ve all heard a million times: growing demand for robust cybersecurity in the face of rising cyber…
Storage has long been the monolith of datacentre components. Deployed in forklift upgrades on multi-year refresh cycles, shiny new arrays have not taken long to…
After being used in Akira and Fog ransomware attacks, a critical Veeam Backup & Replication (VBR) security flaw was also recently exploited to deploy Frag…
Nov 08, 2024Ravie LakshmananOpen Source / Malware A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect…
Since the launch of ChatGPT by Open AI in November 2022, interest in generative artificial intelligence (GenAI) tools has increased dramatically. Its ability to generate…
This November, the Cybersecurity and Infrastructure Security Agency (CISA) kicks off Critical Infrastructure Security and Resilience (CISR) Month, emphasizing the need for a resilient approach…
More than 60,000 D-Link network-attached storage devices that have reached end-of-life are vulnerable to a command injection vulnerability with a publicly available exploit. The flaw,…