Cyber Security

New JinxLoader Targeting Users with Formbook and XLoader Malware

Jan 01, 2024NewsroomMalware / Dark Web A new Go-based malware loader called JinxLoader is being used by threat actors to deliver next-stage payloads such...

New Black Basta decryptor exploits ransomware flaw to recover files

Researchers have created a decryptor that exploits a flaw in Black Basta ransomware, allowing victims to recover their files for free. The decryptor allows...

Scam-as-a-Service Aiding Cybercriminals in Crypto Wallet-Draining Attacks

Dec 30, 2023NewsroomCryptocurrency / Phishing Scam Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets. "These threats...

Happy 14th Birthday, KrebsOnSecurity! – Krebs on Security

KrebsOnSecurity celebrates its 14th year of existence today! I promised myself this post wouldn’t devolve into yet another Cybersecurity Year in Review. Nor...

Hospitals ask courts to force cloud storage firm to return stolen data

Two not-for-profit hospitals in New York are seeking a court order to retrieve data stolen in an August ransomware attack and now stored...

The Week in Ransomware – December 29th 2023

It's been a quiet week, with even threat actors appearing to take some time off for the holidays. We did not see much...

Palo Alto Networks Closes Talon Cyber Security Acquisition

PRESS RELEASESANTA CLARA, Calif., Dec. 28, 2023 /PRNewswire/ -- Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today announced that it has completed the acquisition...

Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accounts

Multiple information-stealing malware families are abusing an undocumented Google OAuth endpoint named "MultiLogin" to restore expired authentication cookies and log into users' accounts,...

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory ProtectionsThe Operation Triangulation attacks are abusing undocumented functions in Apple chips to circumvent hardware-based security measures.A...

Latest articles