Remove Cybercrime Remove Phishing Remove Spyware Remove Surveillance
article thumbnail

Security Affairs newsletter Round 435 by Pierluigi Paganini – International edition

Security Affairs

ransomware builder used by multiple threat actors Cisco fixes 3 high-severity DoS flaws in NX-OS and FXOS software Cybercrime Unpacking the MOVEit Breach: Statistics and Analysis Cl0p Ups The Ante With Massive MOVEit Transfer Supply-Chain Exploit FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown U.S.

article thumbnail

Security Affairs newsletter Round 416 by Pierluigi Paganini – International edition

Security Affairs

Abandoned Eval PHP WordPress plugin abused to backdoor websites CISA adds MinIO, PaperCut, and Chrome bugs to its Known Exploited Vulnerabilities catalog At least 2 critical infrastructure orgs breached by North Korea-linked hackers behind 3CX attack American Bar Association (ABA) suffered a data breach,1.4

Spyware 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 418 by Pierluigi Paganini – International edition

Security Affairs

Twitter confirmed that a security incident publicly exposed Circle tweets FBI seized other domains used by the shadow eBook library Z-Library WordPress Advanced Custom Fields plugin XSS exposes +2M sites to attacks Fortinet fixed two severe issues in FortiADC and FortiOS Pro-Russia group NoName took down multiple France sites, including the French (..)

article thumbnail

A week in security (Sept 20 – Sept 26)

Malwarebytes

Insecure Hikvision security cameras can be taken over remotely MSHTML attack targets Russian state rocket centre and interior ministry Italian mafia cybercrime sting leads to 100+ arrests How to clear your cache Microsoft exchange autodiscover flaw reveals users’ passwords Parents and teachers believe digital surveillance of kids outweighs risks SonicWall (..)

article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybercriminals often use malware to gain access to a computer or mobile device to deploy viruses, worms, Trojans, ransomware, spyware, and rootkits. Remcos, short for Remote Control and Surveillance, was leveraged by malicious cyber actors conducting mass phishing campaigns during the COVID-19 pandemic to steal personal data and credentials.

Malware 88
article thumbnail

Security Affairs newsletter Round 174 – News of the week

Security Affairs

Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. . · Google introduced G Suite alerts for state-sponsored attacks. · Hundreds of thousands MikroTik Routers involved in massive Coinhive cryptomining campaign. · Industrial Sector targeted in surgical spear-phishing attacks. Pierluigi Paganini.

article thumbnail

Security Affairs newsletter Round 413 by Pierluigi Paganini – International edition

Security Affairs

LockBit leaks data stolen from the South Korean National Tax Service Italy’s Data Protection Authority temporarily blocks ChatGPT over privacy concerns CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog Hackers are actively exploiting a flaw in the Elementor Pro WordPress plugin Cyber Police of Ukraine (..)

Spyware 84