Please turn on your JavaScript for this page to function normally.
person
Europe and Russia home to half of credential theft victims worldwide

According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

Google Chrome
Google removes inline installation option for Chrome extensions

Google is shutting down an often used vector for delivering malicious Chrome extensions to users by removing the inline installation option. What will happen? The announcement …

fire
Cryptomining malware digs into nearly 40% of organizations worldwide

Check Point published its latest Global Threat Index for May 2018, revealing that the Coinhive cryptominer impacted 22% of organizations globally – up from 16% in April, an …

biohazard
Traffic manipulation and cryptocurrency mining campaign compromised 40,000+ machines

Unknown attackers have compromised 40,000+ servers, networking and IoT devices around the world and are using them to mine Monero and redirect traffic to websites hosting tech …

red
VPNFilter malware targets new devices, can deliver exploits to endpoints

Cisco Talos researchers have news about the VPNFilter malware, and it doesn’t look good: It is capable of compromising a much wider array of routers than previously …

danger
Sophisticated keyloggers target the finance industry

Lastline found three separate strains of keylogger malware that are currently targeting finance. Lastline’s analysis of the 100 most recent malware samples found among finance …

biohazard
How Mirai spawned the current IoT malware landscape

When, in late 2016, US-based DNS provider Dyn suffered a massive DDoS attack that it resulted in the temporary unavailability of many popular online services, the name of the …

alert
DHS, FBI warn about malware tied to North Korean threat actor

US-CERT has released a new technical alert on malware used by Hidden Cobra, a threat actor whose activities they believe to be directed by the North Korean government. The …

Trojan
BackSwap Trojan exploits standard browser features to empty bank accounts

Creating effective and stealthy banking malware is becoming increasingly difficult, forcing malware authors to come up with innovative methods. The latest creative burst in …

healthcare
1 in 10 healthcare organizations paid a ransom within the last year

More than one in three healthcare organizations have suffered a cyberattack within the last year, while almost one in 10 have paid a ransom or extortion fee, according to …

world
VPNFilter malware compromises over 500,000 networking devices around the world

Cisco Talos researchers have flagged a huge botnet of small and home office routers and NAS devices, capable of collecting communications and data and launching cyber attacks. …

danger
Crypto Me0wing attacks: Kitty cashes in on Monero

It’s been a month since the first Drupalgeddon 2.0 RCE (SA-CORE-2018-002/CVE-2018-7600) exploit was first published, unleashing its destruction into the wild… and …

Don't miss

Cybersecurity news