New Loader Variant Behind Widespread Malware Attacks
Malware infection technique called TxHollower gets updated with stealthy features. Go to Source
Malware infection technique called TxHollower gets updated with stealthy features. Go to Source
A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution. Go to Source
WeTransfer is being used by hackers to circumvent email gateways looking to zap malicious links. Go to Source
Meanwhile, remediation times are ballooning to a year or more in the case of malicious attacks, according to Ponemon Institute. Go to Source
Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election. Go to Source
In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves. Go to Source
Security experts say the attack stemmed from weak cybersecurity controls. Go to Source
An ongoing malvertising campaign is exploiting WordPress plugin vulnerabilities to redirect website visitors to malicious pages. Go to Source
Dropper malware become more popular as hackers turn to more quiet attack techniques to avoid detection. Go to Source
A Spearphone attacker can use the accelerometer in LG and Samsung phones to remotely eavesdrop on any audio that’s played on speakerphone, including calls, music and voice assistant responses. Go to Source