PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks
Feb 27, 2023Ravie LakshmananMalware / Cyber Attack The PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called x64dbg…
Feb 27, 2023Ravie LakshmananMalware / Cyber Attack The PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called x64dbg…
Feb 27, 2023Ravie LakshmananRansomware / Cyber Attack Government entities in Asia-Pacific and North America are being targeted by an unknown threat actor with an off-the-shelf…
Feb 27, 2023Ravie LakshmananBrowser Security / Malware A new ChromeLoader malware campaign has been observed being distributed via virtual hard disk (VHD) files, marking a…
Feb 27, 2023Ravie Lakshmanan The Dutch police announced the arrest of three individuals in connection with a “large-scale” criminal operation involving data theft, extortion, and…
Feb 24, 2023Ravie LakshmananCyber War / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase their cyber vigilance,…
Feb 24, 2023The Hacker NewsArtificial Intelligence / Cybersecurity The use of AI in cybersecurity is growing rapidly and is having a significant impact on threat…
Feb 24, 2023Ravie LakshmananMobile Security / Firmware Google said it’s working with ecosystem partners to harden the security of firmware that interacts with Android. While…
Feb 24, 2023The Hacker NewsCybersecurity Webinar / SaaS Security Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting…
Feb 24, 2023Ravie LakshmananPrivacy / Data Safety An investigation into data safety labels for Android apps available on the Google Play Store has uncovered “serious…
Feb 23, 2023Ravie LakshmananCryptocurrency / Malware An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new information stealer…
Feb 23, 2023Ravie LakshmananEndpoint Security / Cryptocurrency Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf…
Feb 23, 2023Ravie Lakshmanan Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine products since January 20,…