stealing
-
State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks
A China-based advanced persistent threat (APT) group is possibly deploying short-lived ransomware families as a decoy to cover up the…
Read More » -
Former Amazon Employee Found Guilty in 2019 Capital One Data Breach
A 36-year-old former Amazon employee was convicted of wire fraud and computer intrusions in the U.S. for her role in…
Read More » -
Mitigate Ransomware in a Remote-First World
Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid…
Read More » -
MaliBot: A New Android Banking Trojan Spotted in the Wild
A new strain of Android malware has been spotted in the wild targeting online banking and cryptocurrency wallet customers in…
Read More » -
New Zimbra Email Vulnerability Could Let Attackers Steal Your Login Credentials
A new high-severity vulnerability has been disclosed in the Zimbra email suite that, if successfully exploited, enables an unauthenticated attacker…
Read More » -
Researchers Detail How Cyber Criminals Targeting Cryptocurrency Users
Cybercriminals are impersonating popular crypto platforms such as Binance, Celo, and Trust Wallet with spoofed emails and fake login pages…
Read More » -
FluBot Android Spyware Taken Down in Global Law Enforcement Operation
An international law enforcement operation involving 11 countries has culminated in the takedown of a notorious mobile malware threat called…
Read More » -
Interpol Nabs 3 Nigerian Scammers Behind Malware-based Attacks
Interpol on Monday announced the arrest of three suspected global scammers in Nigeria for using remote access trojans (RATs) such…
Read More » -
Malware Analysis: Trickbot
In this day and age, we are not dealing with roughly pieced together, homebrew type of viruses anymore. Malware is…
Read More » -
New Unpatched Bug Could Let Attackers Steal Money from PayPal Users
A security researcher claims to have discovered an unpatched vulnerability in PayPal’s money transfer service that could allow attackers to…
Read More »