Belgian prosecutors are investigating the hacking of oil facilities in the country’s ports, including Antwerp—Europe’s second-biggest port after Rotterdam. In Germany, prosecutors said they are looking into cyberattacks targeting oil facilities. The ransomware targeting oil facilities locked the systems and…
Latest posts - Page 72
Threat actor exploiting a zero-day vulnerability in the Zimbra open-source email platform
A threat actor, likely to be Chinese, targeted a zero-day vulnerability in the Zimbra open-source email platform. The zero-day exploitation is part of a spear-phishing program that began in December 2021. Volexity, a cybersecurity company, recorded the espionage operation in…
UpdateAgent Malware, updated variant infects Mac users through Adware
Microsoft revealed details of a Mac Trojan that was previously undocumented. Microsoft said the trojan underwent several changes ever since it first appeared in September 2020. The evolved trojan version has become advanced, as the article puts it, “increasing progression…
SolarMaker malware evolved to sustain in hacked systems
Threat actors regularly work on their attack strategy and defence measures to beat the protective measures. Solarmaker information stealer and backdoor operators have been using stealthy Windows Registry tricks to set up a deep and permanent connection with compromised systems. …
Emsisoft’s Deadbolt decryption tool is available
Deadbolt ransomware has got a decryption key after a few days it first appeared. However, the threat actors must provide a decryption key for it to work. Emsisoft, the security vendor, released the key. The key comes a few days…
Secure keys generated by researchers using natural silk fibres and the keys offered a strong authentication
At South Korea’s Gwangju Institute of Science and Technology (GIST), researchers have used natural silk fibres, silk fibres that are made from domesticated silkworms to create a digital security system. The system is environmentally friendly, and the researchers assert that…
Microsoft mitigates several attacks in 2021
This week Microsoft said it prevented several denial-of-service (DDoS) attacks targeting its customers in 2021. Three of the attacks exceeded 2.4 terabits per second (Tbps). In November, A DDoS attack occurred targeting an anonymous Azure customer in Asia, which lasted…
BRATA, android malware, evolves to become more dangerous
Cybercriminals are using banking trojans extensively. We discuss Android malware that has evolved to be more harmful and sneakier. Cleafy, a security firm, studied three new BRATA variants and found that the trojan can perform a factory reset, as a…
Hackers using a new method to plant AsyncRAT malware
A malware campaign, since September 2021, has been using an advanced phishing attack to deliver the AsyncRAT trojan. “Through a simple email phishing tactic with an HTML attachment, threat attackers are delivering AsyncRAT (a remote access trojan) designed to remotely…
Cybersecurity trends in 2022
Every day, new technologies are disrupting and improving our lives, businesses, industries, and in the larger landscape, the conveniences and efficiencies we once thought to be the stuff of futurists. If anyone asks the average person how they thought the…