Category: Computer Hacking News
Researchers discovered that the SideCopy APT group targeted government officials in India and Afghanistan via the new AuTo data stealer for cyberespionage. Hackers use ActionRAT and AuTo Stealer malware in this campaign. Government entities are...
There’s a new phishing campaign targeting verified Twitter accounts by urging them, in an email, to update their details if they do not want to lose their verified status. Hackers are reportedly harvesting the credentials...
LogDNA announced that cybersecurity investment and advisory firm NightDragon will lead a $50m Series D funding round, with participation from existing investors Emergence and Initialized Capital. click here to read full Article Read more...
Back in September, while gathering intelligence on an IoT search engine, CyberNews researchers stumbled upon a DS_STORE file that was apparently stored on a web server owned by Microsoft Vancouver. click here to read...
A series of malvertising campaigns by Magnat group are infecting users via fake popular games and app installers. It spreads two commodity password stealers Azorult and Redline, MagnatBackdoor, and MagnatExtension. These threats are very effective...
Proofpoint observed COVID-19 themes impacting education institutions throughout the pandemic, but consistent, targeted credential theft campaigns using such lures began in October 2021. click here to read full Article Read more on computer hacking...
Israeli security firm Claroty is raising $400 million in a Series E round led by SoftBank. The fresh funding will be used to acquire Medigate, which specializes in protecting medical infrastructure. click here to...
Researchers believe that the malvertising campaigns target users interested in software-related keywords. This campaign is gaining momentum as an effective way to harvest information from unsuspecting users. click here to read full Article Read...
DoppelPaymer hijacks ProcessHacker and exploits KProcessHacker to kill a list of processes, including both antivirus (AV) and endpoint detection and response (EDR) applications. click here to read full Article Read more on computer hacking...
Microsoft has always been the target of phishing attacks. A new wave of phishing attacks is using fake Office 365 notifications with an aim to steal victims’ Microsoft credentials. click here to read full...
The funding round was led by StepStone Group, with participation from existing investors Ten Eleven Ventures, Main Sequence Ventures, Reinventure, Our Innovation Fund, and Turnbull & Partners. click here to read full Article Read...
Many employees reported anti-work messages sent to the printers of their organizations. The messages encourage workers to protect their rights, discuss their pay with coworkers, and demand better pay. click here to read full...
Since at least 2017, a threat actor has run thousands of servers in entry, middle, and exit positions of the Tor network in what a researcher has described as an attempt to deanonymize Tor...
The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group’s Pegasus spyware, according to a report published Friday by Reuters. click here to read...
Researchers suspect that the stealthy hacking group called WIRTE has been conducting attacks against government and diplomatic entities in the Middle East, since at least 2019. The group has targeted victims in multiple regions,...
The emails offer recipients a free Omicron PCR test, which they claim will allow them to circumvent limitations. The emails purport to come from the U.K’s National Health Service (NHS). click here to read...