Cyber Security News

Malware hiding in Textbooks and Essays
Date

Malware hiding in Textbooks and Essays

For students purchasing a new year’s worth of academic material and textbooks, the price for the books can be overwhelming. For those students, a quick search may reveal that the book they desperately need is available for free online. For a lot of students free beats paid 99% of the time, sadly, ac

TrickBot Upgrades for SIM Swapping Attacks
Date

TrickBot Upgrades for SIM Swapping Attacks

To say that TrickBot trojan has become more than a constant pain for those defending networks would be an understatement. Added to the constant stream of updates and upgrades the malware authors also rent out their creation to other cybercriminal organizations. This tactic has resulted in the malwar

Enterprise Networks under Attack
Date

Enterprise Networks under Attack

Hackers are actively attacking enterprise networks by exploiting flaws made public earlier this month. The hackers taking advantage of public technical details and demo exploit code to launch attacks against enterprise targets. The hackers are exploiting flaws discovered in Webmin, a web-based utili

Advanced Hackers Increase Scope of Bank Attacks
Date

Advanced Hackers Increase Scope of Bank Attacks

Hackers do not need computer science geniuses to carry out successful cyber-attacks or scams, with many attacks relying on the work and malware developed by previous threat actors. When a seemingly advanced hacker group which uses its own tools begins to attack financial institutions warning flags s

Adwind Trojan Seen Targeting Utility Companies
Date

Adwind Trojan Seen Targeting Utility Companies

Last week this publication covered how the Cerberus banking trojan was filling a gap in the malware-as-a-service market (MaaS) left by a crackdown on other similar trojans. The threats posed by MaaS schemes was briefly looked at in that article. As if to put a finer point on threat security research

Cerberus Banking Trojan Emerges To Fill Market Gap
Date

Cerberus Banking Trojan Emerges To Fill Market Gap

Banking trojans, malware-as-a-service (MaaS), and others are just some of the terms used by security researcher’s to define malware types and cybercrime. This jargon can come to be a headache for some and a nightmare for others when they find out their bank accounts have been cleaned out. With the e

Varenyky Actively Targeting France
Date

Varenyky Actively Targeting France

Researchers based at ESET, the well-known Slovakian security firm, have published an article detailing the emergence of a new spambot targeting those residing within the borders of France. A spambot is a malicious program designed to collect email addresses, once a list is created spam email is sent

LokiBot Now Hidden in Images
Date

LokiBot Now Hidden in Images

State-sponsored actors have long known that hiding malware in images, a technique called steganography, is an effective way to distribute and infect users with malware. Steganography can be defined as the technique of hiding secret data within an ordinary, non-secret, file or message to avoid detect

FBI Warns of New Cyber Romance Scam
Date

FBI Warns of New Cyber Romance Scam

Often in the InfoSec community, a lot of attention is given to new and innovative malware variants and how they infect a user to turn them from daily user to victim. This has led to a view that most hackers and cybercriminals are incredibly tech-savvy and can code lines at a rate of hundreds per min

Cognitive Attack Loop: New Ideas to Combat Evolving Threats
Date

Cognitive Attack Loop: New Ideas to Combat Evolving Threats

The business of protecting users, networks, and entire systems from hackers and state-sponsored threat groups has never been a stagnant industry or boring. New threats in the form of malware are expected but how to detect them and ultimately prevent them from causing havoc is not an easy task. Secur