Google has culled 500 over Chrome browser extensions used in a massive ad fraud campaign that pingponged 1.7 million users through dozens of ads and redirected them to phishing site.
New malware Ramsay was found to specifically target air-gapped networks by laying low and inactive in infected files until it is connected to the intended target.
A massive supply chain attack had distributed malware to tens of thousands of ASUS computers worldwide through legitimate ASUS software updates. It appears as if the attackers had inside information about ASUS servers and systems.
Since U.S. and Europe’s first experience of ATM malware and jackpotting attacks in 2017 and 2018, evidence is mounting that the attacks are making a comeback with new twists and approaches.
There is an obvious problem with how we approach cyber security. But blockchain may enable a single marketplace of enterprises, consumers, vendors and geographically-diverse security experts to help revise the hiring model, make cyber security more efficient, and decrease the impact of malicious attacks globally.
New report shows Chinese hackers engaging in cyber espionage by stealing SMS messages and phone records to track and monitor top diplomats and foreign leaders.
Are you a victim of cryptojacking? Both individuals and organizations are now at risk of this new hacking approach to tap into your computer’s processing power. Most famously, Coinhive has been promoting this controversial new practice to tap for mining the cryptocurrency Monero.
Turns out that the APT group Cozy Bear that became internationally infamous in 2016 for high profile hacks never really went away. The Russian hackers have hit at least three European nations since it supposedly went underground in 2016.
Crypto mining malware is now the weapon of choice for hackers worldwide. The skyrocketing prices of cryptocurrencies is driving the scale of cryptojacking attacks, and can mean very lucrative profits ranging from hundreds of dollars to twenty thousand dollars per month. Victims now include Tesla and the UK government.
In a malware attack on Bapco, hackers gained access to the network and loaded the data wiper into the central anti-virus software, from where it was distributed to all machines.