Remove Cryptocurrency Remove Cybercrime Remove DDOS Remove Spyware
article thumbnail

Security Affairs newsletter Round 240

Security Affairs

Experts warn of spike in TCP DDoS reflection attacks targeting Amazon, SoftLayer and telco infrastructure. TA505 Cybercrime targets system integrator companies. DDoS-for-Hire Services operator sentenced to 13 months in prison. Two men arrested for stealing $550,000 in cryptocurrency with Sim Swapping. Pierluigi Paganini.

DDOS 51
article thumbnail

Security Affairs newsletter Round 350

Security Affairs

Pay attention to Log4j attacks, Dutch National Cybersecurity Centre (NCSC) warns Vulnerabilities in Control Web Panel potentially expose Linux Servers to hack US Treasury Department sanctions 4 Ukrainian officials for working with Russian intelligence A bug in McAfee Agent allows running code with Windows SYSTEM privileges Experts warn of anomalous (..)

VPN 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 340

Security Affairs

Hundreds of thousands of fake warnings of cyberattacks sent from a hacked FBI email server GravityRAT returns disguised as an end-to-end encrypted chat app Intel and AMD address high severity vulnerabilities in products and drivers New evolving Abcbot DDoS botnet targets Linux systems Retail giant Costco discloses data breach, payment card data exposed (..)

Spyware 53
article thumbnail

IT threat evolution Q1 2022

SecureList

In January, we reported a malicious campaign targeting companies that work with cryptocurrencies, smart contracts, decentralized finance and blockchain technology: the attackers are interested in fintech in general. The campaign has two goals: gathering information and stealing cryptocurrency. Other malware.

Phishing 103
article thumbnail

Who Wants to Support My Work Commercially?

Security Boulevard

Folks, Who wants to dive deep into some of my latest commercially available research and stay on the top of their OSINT/cybercrime research and threat intelligence gathering game that also includes their team and organization? Dancho Danchev’s “Intell on the Criminal Underground – Who’s Who in Cybercrime for ” Presentation – [PDF].

article thumbnail

What is Malware? Definition, Purpose & Common Protections

eSecurity Planet

From ransomware attacks locking businesses out of their data until they pay potentially millions of dollars to spyware tracking users’ every move through their infected device, the effects of malware can be devastating. This note will provide instructions on how to pay the ransom, usually through difficult-to-trace means like cryptocurrency.

Malware 69
article thumbnail

Advanced threat predictions for 2024

SecureList

This politician became the target of a previously undiscovered “zero-day” attack aimed at infecting his phone with spyware. First, they can carry out actual cyberattacks, including DDoS attacks , data theft or destruction, website defacement, and so on. There are several ways hacktivists may influence cybersecurity.

Hacking 102