![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28082148/malware_fire-400x200.jpg)
Researchers uncover DarkGate malware’s Vietnamese connection
WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan (RAT) …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094415/money-1-400x200.jpg)
The double-edged sword of heightened regulation for financial services
Financial services organizations are enticing targets for cybercriminals due to their significant wealth holdings, presenting abundant opportunities for monetary gain through …
![Google Play Protect](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/19123137/google-play-protect2-400x200.jpg)
Google Play Protect takes on malicious apps with code-level scanning
Google is enhancing Google Play Protect’s real-time scanning to include code-level scanning, to keep Android devices safe from malicious and unwanted apps, especially …
![Google ads](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/18131424/google_ads-18012023-02-400x200.jpg)
Google ads for KeePass, Notepad++ lead to malware
Users using Google to search for and download the KeePass password manager and the Notepad++ text editor may have inadvertently gotten saddled with malware, says Jérôme …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203458/data_analytics5-400x200.jpg)
Cyber resilience starts in the C-suite
In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs or managing …
![Jupyter](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/18095639/jupyter-1400-400x200.jpg)
Jupyter Notebooks targeted by cryptojackers
Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28085702/privacy-400x200.jpg)
Generative AI merges with intelligent malware, threat level rises
There has been a 44% increase in organized ID fraud in North America compared to preceding quarters, according to AU10TIX. This upsurge is believed to be driven by the ongoing …
![fake](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/08154901/fake_website-400x200.jpg)
Researchers warn of increased malware delivery via fake browser updates
ClearFake, a recently documented threat leveraging compromised WordPress sites to push malicious fake browser updates, is likely operated by the threat group behind the …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19133655/malware-skull-red-400x200.jpg)
Compromised Skype accounts deliver DarkGate malware to employees
A threat actor is using compromised Skype accounts to deliver the DarkGate malware to target organizations, Trend Micro researchers have warned. “Versions of DarkGate …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28200747/eye-cyborg-400x200.jpg)
As biohacking evolves, how vulnerable are we to cyber threats?
Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin and these devices do not usually use secure technologies, according to …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171231/malware-400x200.jpg)
Endpoint malware attacks decline as campaigns spread wider
In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite campaigns growing more widespread, ransomware detections are …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/08121851/ai-robot-400x200.jpg)
Cybersecurity pros predict rise of malicious AI
76% of cybersecurity professionals believe the world is very close to encountering malicious AI that can bypass most known cybersecurity measures, according to Enea. 26% see …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD