Articles on cyber-security and latest trends
How Effective Is Security Training in Preventing Cyber Attacks?
Do your security controls work?
Job Seekers Targeted in Lazarus Group Hack
The state-backed Lazarus group in North Korea is targeting job seekers with malware that can run on Apple Macs. The malware was compiled for both Intel and Apple Silicon chipsets, according to security firm ESET. It removed the signed Mach-O executable file from a fake document.
Chinese Hackers Backdoor Chat App to Steal Data From Windows, Linux & macOS
Researchers uncovered a Trojan horse version of Mimi that is primarily focused on the Chinese market. This malware is cross-platform and can be used on many platforms. There are links between this malware and the Chinese-backed threat group APT Dec 27, researchers say.
Hackers Can Use Emojis To Deliver Exploit To The Target
Cybersecurity researchers believe hackers will soon be able to use any emoji set to take over your computer or smartphone. The exploit can be delivered to the target with just a series of emoticons at the touch of a button. WARNING: Emoji attacks must go through a filter that only accepts emojis.
Google Discovers the Initial Access Broker Behind the Conti Ransomware Which Infiltrates Organizations Using Phishing
Google’s Threat Analysis Group (TAG) took the wraps off a new initial access broker that it said is closely affiliated to a Russian cyber crime gang notorious for its Conti and Diavol ransomware operations.
Conti Ransomware Was Released by the CSA With Domains Used in Ransomware Attacks
Joint statement with the FBI and the NSA warns of increased Conti Ransomware attacks
The Conflict Between Russia and Ukraine Is Getting Worse
Telegram Has Become a Cyber Criminal’s Digital Forefront
Zero-Day Exploits Are No Longer An Issue For Apple Users
On Wednesday, Apple released 13 fixes for serious security bugs on macOS and 10 fixes for flaws on iOS/iPadOS. These include fixes for two zero-day bugs, one of which may have been used by attackers in the wild.
How Redline Malware Uses Omicron to Fool Users
Malware is using Covid-19 as a tool.
North Korean Hackers Took Advantage of a Chrome zero-day Vulnerability Before the Patch Was Released
Google’s Threat Analysis Group (TAG) said that hacker groups have exploited the Remote Code Execution (RCE) vulnerability that is being monitored in Chrome.
Newest Tricks Used in TrickBot Trojan
The Titan TrickBot Trojan implemented a fantastic debugging protection feature. Before the researchers can even begin to investigate the malicious code, it detects security analysis and disables their browsers.
Latest AT&T Report on Cybersecurity Insights
Reports on cybersecurity were provided by AT&AT.
Details Behind the REvil Ransomware Group’s Arrest
The Russian Federal Security Service, or FSB, recently announced the arrest of REvil, a ransom group. In Russia and around the world, the hacker organization is known by this moniker.