Security News

Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded 'AcidPour' Malware
2024-03-22 03:06

The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new findings from SentinelOne show. The cybersecurity firm also confirmed...

Evasive Sign1 malware campaign infects 39,000 WordPress sites
2024-03-21 15:56

A previously unknown malware campaign called Sign1 has infected over 39,000 websites over the past six months, causing visitors to see unwanted redirects and popup ads. The threat actors inject the malware into custom HTML widgets and legitimate plugins on WordPress sites to inject the malicious Sign1 scripts rather than modifying the actual WordPress files.

AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
2024-03-21 12:48

Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that's used to target Laravel applications and steal sensitive data. "It works by scanning and taking out important...

Attackers are exploiting JetBrains TeamCity flaw to deliver a variety of malware
2024-03-21 09:57

Attackers are exploiting the recently patched JetBrains TeamCity auth bypass vulnerability to deliver ransomware, cryptominers and remote access trojans, according to Trend Micro researchers. CVE-2024-27198, an authentication bypass vulnerability affecting the TeamCity server, has been disclosed and fixed in early March, along with CVE-2024-27199 - a directory traversal vulnerability in the same instance.

Malware stands out as the fastest-growing threat of 2024
2024-03-21 04:00

Malware stands out as the fastest-growing threat of 2024, with 41% of enterprises witnessing a malware attack in the past year - closely followed by phishing and ransomware. The research found that 43% of enterprises failed a compliance audit in the past twelve months - with the report highlighting a very clear correlation between compliance and data security.

The most prevalent malware behaviors and techniques
2024-03-20 10:37

An analysis of 100,000+ Windows malware samples has revealed the most prevalent techniques used by malware developers to successfully evade defenses, escalate privileges, execute the malware, and assure its persistence. The analyzed malware samples were most often delivered via malicious email attachments featuring macro-enabled documents, Windows shortcut files, ISO/VHD containers, and MSI installers.

New BunnyLoader Malware Variant Surfaces with Modular Attack Features
2024-03-20 09:43

Cybersecurity researchers have discovered an updated variant of a stealer and malware loader called BunnyLoader that modularizes its various functions as well as allow it to evade detection....

From Deepfakes to Malware: AI's Expanding Role in Cyber Attacks
2024-03-19 13:55

Large language models (LLMs) powering artificial intelligence (AI) tools today could be exploited to develop self-augmenting malware capable of bypassing YARA rules. "Generative AI can be used to...

Suspected Russian Data-Wiping 'AcidPour' Malware Targeting Linux x86 Devices
2024-03-19 09:59

A new variant of a data wiping malware called AcidRain has been detected in the wild that's specifically designed for targeting Linux x86 devices. The malware, dubbed AcidPour, is compiled for...

Fujitsu: Miscreants infected our systems with malware, may have stolen customer info
2024-03-18 20:30

Fujitsu has confirmed that miscreants have compromised some of its internal computers, deployed malware, and may have stolen some customer information. "In a March 15 notice posted on its website, and translated from Japanese, the global tech giant said it had"confirmed the presence of malware on several of our company's work computers, and after conducting an internal investigation "Discovered that files containing personal information and customer information could be illegally taken out."