A Botnet Campaign that Uses Blockchain Transactions to Stay Hidden

A Botnet Campaign that Uses Blockchain Transactions to Stay Hidden - Cybersecurity news - Malware and Vulnerabilities
Akamai finds a long-running cryptomining botnet campaign wherein hackers exploit BTC blockchain transactions to evade detection by the security systems in place.

A New Malware Shares Similarities With WaterBear

A New Malware Shares Similarities With WaterBear - Cybersecurity news - Malware and Vulnerabilities
Palo Alto Networks found a highly sophisticated malware potentially linked to the BlackTech hacking group. It has features and behavior that strongly resembles the WaterBear malware family.

Go malware is now common, having been adopted by both APTs and e-crime groups

The number of malware strains coded in the Go programming language has seen a sharp increase of around 2,000% over the last few years, since 2017, cybersecurity firm Intezer said in a report published this week.

Ryuk ransomware now self-spreads to other Windows LAN devices

A new Ryuk ransomware variant with worm-like capabilities that allow it to spread to other devices on victims' local networks has been discovered by the French national cyber-security agency while investigating an attack in early 2021.

Unprotected Private Key Allows Remote Hacking of Rockwell Controllers

The vulnerability, tracked as CVE-2021-22681 with a CVSS score of 10, was independently reported to Rockwell by researchers at the Soonchunhyang University, Kaspersky, and Claroty.

DarkWorld Ransomware Disguises as Commonly Used Software

Recently, 360 Security Center detected a ransomware that disguised as commonly used software and appeared on the network. The virus called itself DarkWorld in the ransom letter.

SQL Triggers in Website Backdoors

Over the past year, there’s been an increasing trend of WordPress malware using SQL triggers to hide malicious SQL queries within compromised databases to infiltrate them.

North Korean Hackers Targeting Defense Sector Firms with ThreatNeedle Malware

A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry.

Cybersecurity Agencies Warn of Accellion Vulnerability Exploits

On Wednesday, the U.S. CISA along with its counterparts in the U.K., Australia, New Zealand, and Singapore warned that hackers are exploiting unpatched vulnerabilities in Accellion FTA.

Chinese Hackers Using Malicious Firefox Extension to Spy On Tibetan Organizations

Cybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by deploying a malicious Firefox extension on target systems.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags