article thumbnail

Security Affairs newsletter Round 439 by Pierluigi Paganini – International edition

Security Affairs

ALPHV/BlackCat ransomware gang hacked the hotel chain Motel One FBI warns of dual ransomware attacks Progress Software fixed two critical severity flaws in WS_FTP Server Child abuse site taken down, organized child exploitation crime suspected – exclusive A still unpatched zero-day RCE impacts more than 3.5M

article thumbnail

Spyware in the IoT – the Biggest Privacy Threat This Year

SiteLock

The consequences of which are not only born by companies who are the primary targets of cybercrime. Most manufacturers of IoT enabled devices update their firmware frequently. But, every advancement towards realizing a 21st century quality of life comes with a wave of security threats, old and new. Update, Update, Update.

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybercriminals often use malware to gain access to a computer or mobile device to deploy viruses, worms, Trojans, ransomware, spyware, and rootkits. For the top malware strains, the advisory provides six mitigations: Update software, including operating systems, applications, and firmware, on IT network assets. Enforce MFA.

Malware 87
article thumbnail

Top 9 Cybersecurity Challenges SMEs Currently Face

Responsible Cyber

As cybercrime has become well-funded and increasingly sophisticated, phishing remains one of the most effective methods used by criminals to introduce malware into businesses. Ransomware is a type of malware, but others exist, including spyware, adware, bots and Trojans. Phishing and Spear Phishing.

article thumbnail

IT threat evolution Q1 2022

SecureList

MoonBounce: the dark side of UEFI firmware. Late last year, we became aware of a UEFI firmware-level compromise through logs from our firmware scanner (integrated into Kaspersky products at the start of 2019). One of the things you can do to protect yourself from advanced mobile spyware is to reboot your device on a daily basis.

Phishing 103
article thumbnail

What is Malware? Definition, Purpose & Common Protections

eSecurity Planet

From ransomware attacks locking businesses out of their data until they pay potentially millions of dollars to spyware tracking users’ every move through their infected device, the effects of malware can be devastating. Firmware rootkits are also known as “hardware rootkits.”. Need More Intel on Rootkits?

Malware 69
article thumbnail

APT trends report Q3 2021

SecureList

Historically, Lazarus used MATA to attack various industries for cybercrime-like intentions: stealing customer databases and spreading ransomware. Historically, its Windows implant was represented by a single-stage spyware installer. Southeast Asia and Korean Peninsula. This version was detected and researched several times up to 2018.

Malware 140