Vega Stealer Malware Takes Aim at Chrome, Firefox
While it’s a simple payload for now, researchers said Vega has the ability to evolve into something more concerning in the future. Go to Source
While it’s a simple payload for now, researchers said Vega has the ability to evolve into something more concerning in the future. Go to Source
The Panda banking trojan, a spin-off from the infamous Zeus malware, is widening its net to attack more than just financial services targets, as seen in three ongoing campaigns discovered in May. Go to Source
The GandCrab ransomware continues to virulently spread and adapt to shifting cyber-conditions, most recently crawling back into relevance on the back of several large-scale spam campaigns. Go to Source
The leak of point-of-sale malware source code is a double-edge sword to researchers who view it as boon to research, but a headache when it comes to inspiring future variants and attacks. Go to Source
A new malware campaign being rapidly spread on Facebook is infecting users’ systems to perform credential theft, cryptomining, and click fraud. Go to Source
Apple, Microsoft, Red Hat and others have built an uncannily similar privilege escalation flaw into their Intel-based products. Go to Source
Nigerian-based cybercriminals are growing more dangerous as they add sophisticated tools to their arsenal, including complex remote access trojans, a new report reveals. Go to Source
Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light on IoT security. Go to Source
An attacker can gain man-in-the-middle access to inject a rogue executable file onto the phone. Go to Source
The bill would have allowed companies in the state to perform offensive cyberactions in the face of an attack. Go to Source