AuthorJai Vijayan, Contributing Writer

More Security Flaws Found in Apple’s OS Technologies

Apple's updates this week included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections.

Millions of Routers, IoT Devices at Risk as Malware Source Code Surfaces on GitHub

"BotenaGo" contains exploits for more than 30 vulnerabilities in multiple vendor products and is being used to spread Mirai botnet malware, security vendor says.

Threat Actors Use Microsoft OneDrive for Command-and-Control in Attack Campaign

Signs hint at Russia's APT28, aka Fancy Bear, being behind the attacks, according to new research.

REvil Ransomware Gang Arrests Trigger Uncertainty, Concern in Cybercrime Forums

Threat actors from Eastern Europe seen expressing some concern about Russia being a safe place for them to continue operating, researchers say.

Researchers Discover Dangerous Firmware-Level Rootkit

MoonBounce is the latest in a small but growing number of implants found hidden in a computer's Unified Extensible Firmware Interface (UEFI).

Nigerian Police Arrest 11 Individuals in BEC Crackdown

More than 50,000 targets around the world have been affected by the business email compromise scams, Interpol reports.

Nigerian Police Arrest 11 Individuals in BEC Crackdown

More than 50,000 targets around the world have been affected by the business email compromise scams, Interpol reports.

Microsoft Details Recent Damaging Malware Attacks on Ukrainian Organizations

"WhisperGate" malware was used to overwrite Master Boot Record and other files to render systems inoperable at several organizations in Ukraine, Microsoft says.

Russia Takes Down REvil Ransomware Operation, Arrests Key Members

Timing of the move has evoked at least some skepticism from security experts about the country's true motives.

Cloud Apps Replace Web as Source for Most Malware Downloads

Two-thirds of all malware distributed to enterprise networks last year originated from cloud apps such as Google Drive, OneDrive, and numerous other cloud apps, new research shows.

© 2022 Camel Larry

Theme by Anders NorénUp ↑