Hackers belonging to a threat group dubbed LYCEUM (aka HEXANE) have been launching attacks on organizations in the oil and gas sector since May of this year, new research by SecureWorks shows. This …
Trojan Dropper Malware Found in Android App With 100M Downloads
A popular Android app with over 100 million installs from the Google Play Store recently began serving users a Trojan dropper than can install other malware on affected devices, security researchers …
Continue Reading about Trojan Dropper Malware Found in Android App With 100M Downloads
IRS Warns of New Imposter Scam That Spreads Malware
The IRS is warning taxpayers about a phishing campaign in which threat actors are masquerading as IRS agents. The scammers are distributing emails made to look like official IRS messages. Recipients …
Continue Reading about IRS Warns of New Imposter Scam That Spreads Malware
New Canon Survey Reveals Critical Gaps in Companies’ Cybersecurity Agenda
A new survey indicates that when it comes to cybersecurity, businesses are most concerned with the actions of their own staff. When asked about the biggest threat to their organization, 30% of …
Continue Reading about New Canon Survey Reveals Critical Gaps in Companies’ Cybersecurity Agenda
Why adware and Trojans plague the education industry
In 2018, the education sector was the number one target in cyber campaigns involving adware and Trojans, and the second-most targeted industry when it comes to ransomware campaigns, a report by …
Continue Reading about Why adware and Trojans plague the education industry
Norman Cryptominer Employs Sophisticated Obfuscation Tactics
Security researchers with Varonis have spotted a sophisticated new strain of cryptomining malware that uses various obfuscation tactics in order to avoid detection. The researchers describe the …
Continue Reading about Norman Cryptominer Employs Sophisticated Obfuscation Tactics
Cloud Atlas threat group updates weaponry with polymorphic malware
Researchers with Kaspersky labs have uncovered a new attack campaign by the advanced persistent threat (APT) group Cloud Atlas (aka inception). The attacks rely on polymorphic malware that makes …
Continue Reading about Cloud Atlas threat group updates weaponry with polymorphic malware
Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons
New research by PWC UK shows that the capability of many commercial speakers to emit frequencies outside the range of human hearing can enable hackers to turn these devices into acoustic weapons that …
Continue Reading about Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons
Repurposing Mac Malware Not Difficult, Researcher Shows
New research by Patrick Wardle, a Mac security researcher at Jamf, shows that it is relatively easy for skilled threat actors to repurpose known malware and to make sure that signature-based security …
Continue Reading about Repurposing Mac Malware Not Difficult, Researcher Shows
Why remote workers are an underrated security risk for small businesses
A mere 4% of small businesses in the United States have fully adopted the cybersecurity best practices outlined by the US Small Business Administration (SBA), a new report by Nationwide found. Around …
Continue Reading about Why remote workers are an underrated security risk for small businesses