Archive for the ‘cybercrime/malcode’ category: Page 14

Oct 17, 2023

Silent Predator Unveiled: Decoding WebWyrm Stealthy Malware affecting 50 countries

Posted by in categories: cryptocurrencies, cybercrime/malcode, employment, evolution, finance, military

In the intricate landscape of global cybersecurity, Webwyrm malware has surfaced as a formidable adversary, casting its ominous shadow across 50 nations and leaving in its wake over 100,000 compromised victims. This insidious digital menace successfully emulates in excess of 1,000 reputable companies globally, with the ensuing potential financial fallout estimated to surpass a staggering $100 million. It is imperative for cybersecurity professionals and organizations alike to comprehend the multifaceted nature of this threat to devise and implement robust defensive strategies effectively.

In the dynamic realm of cyber threats, malicious actors incessantly refine their Tactics, Techniques, and Procedures (TTPs), exploiting extant vulnerabilities and augmenting the efficacy of their malicious campaigns. Webwyrm epitomizes this relentless pursuit of evolution, embodying a level of sophistication reminiscent of infamous cyber threats of yore, such as the notorious ‘Blue Whale Challenge.’

WebWyrm malware orchestrates a complex, deceptive narrative aimed at duping unsuspecting job seekers into relinquishing their cryptocurrency. Initiating contact predominantly via WhatsApp, the malefactors likely leverage data procured from employment portals to pinpoint and engage individuals predisposed to their deceptive overtures. Prospective victims are enticed with promises of lucrative weekly remuneration, ranging between $1200 and $1500, contingent upon the completion of daily task “packets” or “resets.”

Oct 14, 2023

Cybersecurity Builds Trust in Critical Infrastructure

Posted by in categories: cybercrime/malcode, economics, energy

Where reliability matters, as it does in energy, resilience against cyberattacks enhances a company’s reputation. Disruptions damage that reputation.

In 2021, a ransomware attack shut down Colonial Pipeline operations for six days. Gas shortages in the eastern US, economic turmoil, and eye-catching headlines resulted. Interest in cybersecurity for critical infrastructure intensified — and many leaders seemed to learn the wrong lesson.

Energy sector leaders often take cyber vulnerabilities seriously only after a significant breach. Experiencing a loss (or watching someone else’s) makes companies tighten cybersecurity to avoid similar losses. This pattern emphasizes the loss-avoidance aspects of cybersecurity. Yet thinking of cybersecurity solely as loss avoidance misses a key value generator cybersecurity provides: trust.

Continue reading “Cybersecurity Builds Trust in Critical Infrastructure” »

Oct 14, 2023

New AI algorithm promises defense against cyberattacks on robots

Posted by in categories: cybercrime/malcode, information science, internet, military, robotics/AI

The researchers tested their algorithm on a replica of a US Army combat ground vehicle and found it was 99% effective in preventing a malicious attack.

Australian researchers have developed an artificial intelligence algorithm to detect and stop a cyberattack on a military robot in seconds.

The research was conducted by Professor Anthony Finn from the University of South Australia (UniSA) and Dr Fendy Santoso from Charles Sturt University in collaboration with the US Army Futures Command. They simulated a MitM attack on a GVT-BOT ground vehicle and trained its operating system to respond to it, according to the press release.

Continue reading “New AI algorithm promises defense against cyberattacks on robots” »

Oct 14, 2023

Google deals a deadly blow to passwords, switches to passkey

Posted by in categories: cybercrime/malcode, internet

The tech giant is following Uber and eBay’s lead in ditching passwords and could have the greatest impact in making it happen.

The death of passwords is imminent and Google has taken a giant step in ensuring it by suggesting users switch to an easier option – passkeys. Starting immediately, Google users will be able to create passkeys and use them to sign in to their accounts, avoiding passwords when possible, the company said in a recent blog post.

Since the advent of the internet passwords have been the most hated component of the entire experience. Early on, users could get away with using simpler combinations of letters and numbers but as cybersecurity risks grew, passwords started becoming longer, tougher, and harder to remember.

Oct 13, 2023

Threat Report: High Tech Industry targeted the most with 46% of attack traffic tagged by NLX

Posted by in category: cybercrime/malcode

SQL Injection is still popular, but attackers are now leaning towards Traversal techniques!

Fastly’s Network Effect Threat Report sheds light on the latest attack traffic patterns & tactics.


Continue reading “Threat Report: High Tech Industry targeted the most with 46% of attack traffic tagged by NLX” »

Oct 13, 2023

DarkGate Malware Spreading via Messaging Services Posing as PDF Files

Posted by in category: cybercrime/malcode

🚨 Beware! DarkGate #malware is now spreading through instant messaging apps like Skype & #Microsoft Teams. Stay cautious and don’t open suspicious documents!

Oct 13, 2023

Adobe Acrobat Reader Vuln Now Under Attack

Posted by in category: cybercrime/malcode

Patch now if you haven’t already: Adobe Acrobat Reader exploits are in the wild. #Adobe

The Cybersecurity Infrastructure & Security Agency (CISA) this week added to its catalog of known exploited vulnerabilities an Adobe Acrobat Reader use-after-free bug.

Adobe Acrobat and Reader Document Cloud Versions 22.003.20282 and 22.003.20281 and earlier contain the flaw (CVE-2023–21608), as do Adobe Acrobat and Reader 20.005.30418 and earlier. The use-after-free vuln allows an attacker to remotely execute malicious code on a compromised account, and execute the exploit when a victim opens the rigged PDF file.

Continue reading “Adobe Acrobat Reader Vuln Now Under Attack” »

Oct 13, 2023

New ZenRAT Malware Targeting Windows Users via Fake Password Manager Software

Posted by in category: cybercrime/malcode

🚨 Heads up! A new malware, ZenRAT, is posing as Bitwarden password manager installation packages.


Make sure to download software from trusted sources only.

Continue reading “New ZenRAT Malware Targeting Windows Users via Fake Password Manager Software” »

Oct 12, 2023

New cyber algorithm shuts down malicious robotic attack

Posted by in categories: cybercrime/malcode, information science, military, robotics/AI

Australian researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on an unmanned military robot and shut it down in seconds.

In an experiment using deep learning to simulate the behavior of the human brain, artificial intelligence experts from Charles Sturt University and the University of South Australia (UniSA) trained the robot’s operating system to learn the signature of a MitM eavesdropping cyberattack. This is where attackers interrupt an existing conversation or .

The algorithm, tested in real time on a replica of a United States army combat ground vehicle, was 99% successful in preventing a malicious attack. False positive rates of less than 2% validated the system, demonstrating its effectiveness.

Oct 12, 2023

Internet companies report biggest-ever denial of service operation

Posted by in categories: cybercrime/malcode, internet

WASHINGTON, Oct 11 (Reuters) — Internet companies Google, Amazon and Cloudflare say they have weathered the internet’s largest-known denial of service attack and are sounding the alarm over a new technique they warn could easily cause widespread disruption.

Alphabet Inc-owned Google (GOOGL.O)said in a blog post published Tuesday that its cloud services had parried an avalanche of rogue traffic more than seven times the size of the previous record-breaking attack thwarted last year.

Internet protection company Cloudflare Inc (NET.N)said the attack was “three times larger than any previous attack we’ve observed.” Inc’s (AMZN.O) web services division also confirmed being hit by “a new type of distributed denial of service (DDoS) event.”

Page 14 of 200First1112131415161718Last