![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100312/biohazard-400x200.jpg)
Pikabot returns with new tricks up its sleeve
After a short hiatus, Pikabot is back, with significant updates to its capabilities and components and a new delivery campaign. About the Pikabot loader Pikabot is a loader …
![ConnectWise](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/26121838/connectwise-1400-400x200.jpg)
ScreenConnect flaws exploited to deliver all kinds of malware (CVE-2024-1709, CVE-2024-1708)
The recently patched vulnerabilities (CVE-2024-1709, CVE-2024-1708) in ConnectWise ScreenConnect software are being exploited by numerous attackers to deliver a variety of …
![US Department of Justice](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16114335/usa-doj-1400-1-400x200.jpg)
Alleged Raccoon Infostealer operator extradited, verification site set up for victims
A Ukrainian national was extradited to the United States from the Netherlands after being indicted for crimes related to fraud, money laundering, and aggravated identity …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09140915/email-1600-400x200.jpg)
Clean links and sophisticated scams mark new era in email attacks
Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social engineering attacks are at all-time highs, …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15104003/face-1400-400x200.jpg)
iOS users beware: GoldPickaxe trojan steals your facial data
Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28082148/malware_fire-400x200.jpg)
Understanding the tactics of stealthy hunter-killer malware
Picus Security has revealed a rise in hunter-killer malware, highlighting a significant shift in adversaries’ capability to pinpoint and thwart advanced enterprise …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171242/ransomware-1-400x200.jpg)
Ransomware tactics evolve, become scrappier
As we enter 2024, ransomware remains the most significant cyberthreat facing businesses, according to Malwarebytes. Malwarebytes reveals that the United States accounted for …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/01152202/botnet-1400-2-400x200.jpg)
As-a-Service tools empower criminals with limited tech skills
As-a-service attacks continue to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up the majority of malicious …
![breach](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/07153034/breach-attack-1400-400x200.jpg)
Chinese hackers breached Dutch Ministry of Defense
Chinese state-sponsored hackers have breached the Dutch Ministry of Defense (MOD) last year and deployed a new remote access trojan (RAT) malware to serve as a backdoor. …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/01152205/botnet-1400-3-400x200.jpg)
FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities
The FritzFrog cryptomining botnet has new potential for growth: a recently analyzed variant of the bot is exploiting the Log4Shell (CVE-2021-44228) and PwnKit (CVE-2021-4034) …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/28135319/usb-chaos-400x200.jpg)
Threat actor used Vimeo, Ars Technica to serve second-stage malware
A financially motivated threat actor tracked as UNC4990 is using booby-trapped USB storage devices and malicious payloads hosted on popular websites such as Ars Technica, …
![White Phoenix](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31083626/white_phoenix-free-ransomware-recovery-tool-400x200.jpg)
Free ransomware recovery tool White Phoenix now has a web version
White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders