article thumbnail

BrandPost: Endpoint Security: Protecting Your Distributed Workforce From Old and New Threats

CSO Magazine

The attacks are becoming more insidious, such as malware that modifies itself to infiltrate a system and hit a specific target, along with attacks directed at firmware. Ransomware attacks also are up, as is crypto-jacking, where a hacker hijacks an endpoint’s processing power to mine cryptocurrency.

article thumbnail

Security Affairs newsletter Round 374 by Pierluigi Paganini

Security Affairs

Critical flaw in Netwrix Auditor application allows arbitrary code execution CISA urges to fix multiple critical flaws in Juniper Networks products Threat actors exploit a flaw in Digium Phone Software to target VoIP servers Tainted password-cracking software for industrial systems used to spread P2P Sality bot Experts warn of attacks on sites using (..)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 352

Security Affairs

Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini. SecurityAffairs – hacking, newsletter). The post Security Affairs newsletter Round 352 appeared first on Security Affairs.

article thumbnail

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Hunters International ransomware gang claims to have hacked the Fred Hutch Cancer Center New NKAbuse malware abuses NKN decentralized P2P network protocol Snatch ransomware gang claims the hack of the food giant Kraft Heinz Multiple flaws in pfSense firewall can lead to arbitrary code execution BianLian, White Rabbit, and Mario Ransomware Gangs Spotted (..)

article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

It has been sold on underground hacker forums for stealing browser data, user credentials, and cryptocurrency information. LokiBot LokiBot is a Trojan malware for stealing sensitive information, including user credentials, cryptocurrency wallets, and other credentials. AZORult's developers are constantly updating its capabilities.

Malware 87
article thumbnail

Security Affairs newsletter Round 341

Security Affairs

U.S. (..)

Banking 65
article thumbnail

HTML Smuggling Techniques on the Rise: Microsoft

eSecurity Planet

The researchers said they had seen Nobelium using HTML smuggling in a spear-phishing campaign in May, and more recently, observed it being used to deliver the banking Trojan Mekotio and the AsyncRAT/MJRAT and Trickbot malware used by attackers to get control of targeted devices and deliver such malware as ransomware.

Firewall 121