What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Malware

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the most impacted by phishing worldwide and is increasingly targeted by QR code phishing. The financial industry also suffers from attacks on the software supply chain and stands among the most . . . Read more

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s new report provides the company’s view on the advanced persistent threats landscape for 2024. Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. New botnets and rootkits will also likely appear, . . . Read more

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat. Mandiant, a cybersecurity company owned by Google, has revealed the details of a 2022 cyberattack run by Russian threat actor Sandworm. . . . Read more

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

A November report from Google Cloud details possible nation-state malware tactics in 2024 and new angles of cyberattacks. What will cybersecurity look like in 2024? Google Cloud’s global Cybersecurity Forecast found that generative AI can help attackers and defenders and urged security personnel to look out for nation-state backed attacks . . . Read more

New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications

A new malware is bypassing an Android 13 security measure that restricts permissions to apps downloaded out of the legitimate Google Play Store. A new report from ThreatFabric, a fraud protection company, exposes SecuriDropper malware, which is capable of bypassing Android 13 restricted settings. The malware makes Android consider the . . . Read more

New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware

A new report from Netskope detailing the top techniques used by cybercriminals to attack organizations found that cloud apps are increasingly being used by threat actors, representing 19% of all clicks on spearphishing links. The report also shed light on the attackers’ targets according to their financial or geopolitical motivations. . . . Read more

Keep Your Data Safe as You Become More Productive for Just $30 Through 10/15

Upgrading to Microsoft Windows 10 Pro can make your work easier and your computer more secure. Get it now for just $29.97 through 10/15. Image: StackCommerce It’s great that Windows comes free with your computer, and free upgrades are available as well. But they tend to be the basic versions, . . . Read more

ZenRAT Malware Targets Windows Users Via Fake Bitwarden Password Manager Installation Package

Windows operating systems are the target of new malware dubbed ZenRAT by U.S.-based cybersecurity company Proofpoint. The attackers built a website that impersonates the popular Bitwarden password manager; if accessed via Windows, the fake site delivers the ZenRAT malware disguised as Bitwarden software. It’s currently unknown if the malware is . . . Read more

New DarkGate Malware Campaign Hits Companies Via Microsoft Teams

Get technical details about how this new attack campaign is delivered via Microsoft Teams and how to protect your company from this loader malware. Image: James Thew/Adobe Stock A new report from global cybersecurity company Truesec reveals a new attack campaign leveraging Microsoft Teams to infect companies’ users. While the . . . Read more

Check Point: Hackers Dropping Physical USB Drives at Watering Holes

Image: Timon/Adobe Stock In its 2023 Mid-Year Cyber Security Report, Check Point Software spotlighted numerous exploits so far this year, including novel uses of artificial intelligence and an old-school attack vector: USB drives. Cybercriminals and nation-state actors see these devices as the best way to infect air gapped, segmented and . . . Read more