A new information stealer named ExelaStealer has become the latest entrant to an already crowded landscape filled with various off-the-shelf malware designed to capture sensitive data from c… Read More
Insider threats are the biggest security risk for organizations because they can cause the most destruction. From taking advantage of privileged access to stealing company… Read More
Mac users are being targeted by a new malware named MacStealer, which steals sensitive information such as credentials stored in the iCloud KeyChain and web browsers, cryptocurrency wallets… Read More
In what's a new kind of software supply chain attack aimed at open source projects, it has emerged that threat actors could seize control of expired Amazon S3 buckets to serve rogue binaries… Read More
mkknewsindia
Representational image only.
| Photo Credit: Photo: Twitter/@IndianCERT
The Indian cyber security agency has issued a warning against “Royal ransomware” viru… Read More
The post UDPOS PoS malware exfiltrates credit card data DNS queries appeared first on CP Blog.
A new PoS malware dubbed UDPoS appeared in the threat landscape and implements a nov… Read More
People browse the web using web browsers installed on their devices. Through them, the web is open to see and visit.
But what will happen when those web browsers have flaws? If the flaw is… Read More
Cybercriminals are doing just about anything to get their hands on user data, even when they have to take them by force.
As discovered by researchers from Cybereason Nocturnus, this EventB… Read More
Local governments across the US have been reporting breaches—this is why.
A couple of weeks ago we talked about Magecart and a newly resurgent exploit called formjacking. Essentially i… Read More
Malwarebytes researchers have highlighted a new phishing technique that attackers are exploiting to target visitors of several websites by leveraging on modified favicon to inject e-skimmers… Read More
The development and use of Point-of-Sale (PoS) malware have turned into a very lucrative market for cybercriminals who manage to make the most of this malware’s abilities – a suc… Read More
With all of the hack tools included in this release and likely in the releases to come, it’s a good idea to start deleting phone apps that could compromise one’s identity… Read More