Security Affairs newsletter Round 362 by Pierluigi Paganini
Security Affairs
APRIL 24, 2022
T-Mobile confirms Lapsus$ had access its systems Are you using Java 15/16/17 or 18 in production? Patch them now!
Security Affairs
APRIL 24, 2022
T-Mobile confirms Lapsus$ had access its systems Are you using Java 15/16/17 or 18 in production? Patch them now!
SecureWorld News
AUGUST 8, 2022
Cybercriminals often use malware to gain access to a computer or mobile device to deploy viruses, worms, Trojans, ransomware, spyware, and rootkits. MOUSEISLAND MOUSEISLAND is usually found within the embedded macros of a Microsoft Word document and can download other payloads. Remcos installs a backdoor onto a target system.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Responsible Cyber
APRIL 8, 2020
Phishing and Spear Phishing. Despite constant warnings from the cyber security industry, people still fall victim to phishing every day. As cybercrime has become well-funded and increasingly sophisticated, phishing remains one of the most effective methods used by criminals to introduce malware into businesses.
Security Affairs
AUGUST 25, 2019
Intel addresses High-Severity flaws in NUC Firmware and other tools. 5 Common Phishing Attacks and How to Avoid Them? Backdoored Webmin versions were available for download for over a year. App tainted with Ahmyst Open-source spyware appeared on Google Play Store twice. 5 Ways to Protect Yourself from IP Address Hacking.
SecureList
MARCH 1, 2021
The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. Number of attacks on mobile users in 2019 and 2020 ( download ). Number of adware attacks on mobile users in 2019 and 2020 ( download ). Pandemic theme in mobile threats.
eSecurity Planet
FEBRUARY 16, 2021
Adware, also known as malvertising , is a type of malware that downloads or displays advertisements to the user interface. Users sometimes unknowingly infect themselves with adware installed by default when they download and install other applications. Additional features of botnets include spam, ad and click fraud, and spyware.
SecureList
MAY 27, 2022
MoonBounce: the dark side of UEFI firmware. Late last year, we became aware of a UEFI firmware-level compromise through logs from our firmware scanner (integrated into Kaspersky products at the start of 2019). When opened, this document eventually downloads a backdoor. Targeted attacks.
Let's personalize your content