Category: EN

Recorded Future Tagged as ‘Undesirable’ in Russia

The Russian government accuses the Mastercard-owned firm of participating in the collection and analysis of data on the actions of the Russia’s armed forces.  The post Recorded Future Tagged as ‘Undesirable’ in Russia appeared first on SecurityWeek. This article has…

Video: Hackers Bypass TSA Security with SQL Injection

We reveal a TSA security flaw that allowed hackers to bypass protocols and access cockpits. Explore the implications of this breach and what can be done. The post Video: Hackers Bypass TSA Security with SQL Injection appeared first on eSecurity…

Ymir Ransomware: A Rising Threat in the Cybersecurity Landscape

  < p style=”text-align: justify;”>The evolving threat landscape continues to present new challenges, with NCC Group’s latest Threat Pulse report uncovering the emergence of Ymir ransomware. This new ransomware strain showcases the growing collaboration among cybercriminals to execute highly sophisticated…

Malware Found Preinstalled on 30,000 Android Devices in Germany

  A concerning cybersecurity issue has surfaced in Germany, where investigators uncovered that nearly 30,000 Android devices were sold with preinstalled malware. The malware, dubbed “BadBox,” resides in the device firmware and affects various internet-enabled devices, including digital picture frames…

Phishing Attacks Double in 2024

SlashNext reports a 202% increase in overall phishing messages and a 703% surge in credential-based phishing attacks in 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Phishing Attacks Double in 2024

New Attacks Exploit VSCode Extensions and npm Packages

Malicious campaigns targeting VSCode extensions have recently expanding to npm, risking software supply chains This article has been indexed from www.infosecurity-magazine.com Read the original article: New Attacks Exploit VSCode Extensions and npm Packages

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns.  Delivered as attachments disguised as archives or Microsoft 365 files, it employs malicious Microsoft Office documents to spread through command-and-control (C2) infrastructure.  It targets sensitive…

How to Lose a Fortune with Just One Bad Click

Adam Griffin is still in disbelief over how quickly he was robbed of nearly $500,000 in cryptocurrencies. A scammer called using a real Google phone number to warn his Gmail account was being hacked, sent email security alerts directly from…