Category: Information Security

fraudulent pop-up ads

Fake NFT Ads: Hacked Sites Steal Crypto

The MalwareHunterTeam has reported that nearly 2,000 compromised WordPress sites are being used to display fraudulent pop-up ads offering NFT deals and cryptocurrency discounts. This campaign aims to deceitfully prompt visitors to connect their...

Silent Threat: Malware-Initiated Scans

Silent Threat: Malware-Initiated Scans

Experts at Palo Alto Networks have discovered that cybercriminals are increasingly resorting to so-called “scanning attacks,” initiated by malicious software, to detect vulnerabilities within target networks. Intriguingly, a significant majority of such attacks originate...

phishing campaign

Windows Users Beware: Phishing Threat Hits Latin America

According to Trustwave SpiderLabs, Latin America has been hit by a new phishing campaign that infects Windows systems through emails. The attack begins with the distribution of emails containing a ZIP file attachment. Upon...

Byakugan malware

New Adobe Scam Unleashes Byakugan Malware

Cybersecurity experts are alerting to a new wave of attacks targeting Portuguese-speaking countries using fake Adobe Reader installers to disseminate a multifunctional malware known as Byakugan. The attack commences with a PDF file that,...

JsOutProx

Financial Institutions Targeted: New JsOutProx Surge

Visa has issued a warning about the increased activity of a new version of the malicious software JsOutProx, targeting financial institutions and their clients. The campaign has affected institutions in South and Southeast Asia,...

Latrodectus malware

Phishing Danger: Latrodectus Malware Deployed

Specialists from Proofpoint and Team Cymru have uncovered a novel malware dubbed Latrodectus, considered an evolution of the well-known IcedID loader, which has been actively deployed in phishing campaigns since November 2023. Initially identified...

FixedFloat cyberattack

FixedFloat Hit Again in $2.8M Breach

The team behind the FixedFloat project has disclosed details of a second security breach of their platform, orchestrated by the same cybercriminals responsible for the February attack. On April 1st, malefactors exploited a vulnerability...

IPStorm Botnet

HTTP/2 Flaw Opens Door to DoS Attacks

A new vulnerability in the HTTP/2 protocol could be exploited to execute Denial of Service (DoS) attacks. This discovery, dubbed “HTTP/2 CONTINUATION Flood,” was made by cybersecurity researcher Bartek Nowotarski, who reported the issue...

Mispadu

Mispadu Trojan Expands: Europe Now Targeted

The banking trojan Mispadu, previously known for its attacks on Latin America and Spanish-speaking users, is now targeting residents of Italy, Poland, and Sweden. According to research by Morphisec, the campaign’s targets include representatives...

Hidden Chrome Features

Urgent Chrome Fix: Patch Addresses Pwn2Own Exploit

Google has remedied a critical vulnerability in the Chrome browser, identified during the Pwn2Own 2024 competition in Vancouver. The vulnerability, CVE-2024-3159, stems from an out-of-bounds read error in the JavaScript V8 engine, potentially allowing...

Moobot botnet

Jackson County Hit by Ransomware: Services Disrupted

Jackson County, a Missouri jurisdiction home to over 715,000 residents, fell victim to a ransomware attack that disrupted its tax payment system and online services, including property registration, marriage license issuance, and inmate searches....