Torna a farsi sentire il malware Emotet dopo alcuni mesi di calma apparente, con attacchi tramite e-mail e allegati nella lingua del bersaglio scelto.
malware
Kaspersky lancia il monito su AdvancedIPSpyware, nuova minaccia sottoforma di backdoor
Il malware rappresenta un’importante minaccia per il fatto di essere basato in domini molto simili al dominio reale di Advanced IP Scanner e per disporre di una firma rubata allo sviluppatore.
Every Second Endpoint Infected
Security specialist BrightCloud has analyzed 95 million endpoints and sensors. Every second one had to deal with at least one infection in the first half of the year.
Il malware sostituisce il ransomware come principale minaccia informatica
I principali obiettivi dei criminali informatici sono le telecomunicazioni, l’ambito sanitario e l’istruzione.
Sophisticated Malware Remains Inactive on PCs For A Month
The crypto-miner Nitrokod escapes detection by security researchers for years. However, according to Check Point, the infection route can also be used for more dangerous malware such as ransomware.
CISA and ASCS Publish the Most Important Malware Variants in 2021
The top malware strains include remote access Trojans (RATs), banking Trojans, info stealers and ransomware.
The Awakening of LNK Files
HP Wolf Security Report reveals new techniques and phishing lures used to deceive employees.
Emotet, primo tra i malware anche durante le vacanze estive
Emotet continua a essere sul gradino più alto del mondo malware.
Abuse of Google Ad System
Visitors to the sites are being redirected to fraudulent websites.
Zscaler Discovers More Than 50 Malicious Apps In The Google Play Store
Together, they amount to more than 300,000 downloads. The apps spread several malware families. They steal confidential data and book unwanted WAP subscriptions.
Consigli per prevenire le minacce informatiche
Malware, phishing, ransomware… sono solo alcune delle minacce informatiche a cui siamo esposti e che si possono prevenire con alcuni accorgimenti di sicurezza.
Evasion Techniques: When Malware Suspects It’s Being “Watched”
By Juanjo Galán, Business Strategy at All4Sec, on malware evasion techniques.
Scoperto MaliBot, il nuovo malware con bersaglio clienti di banche online in Italia e Spagna
Malibot, il nuovo malware per Android che attacca specialmente i clienti di banche online italiani e spagnoli.
Update With New Features: Android Trojan Brata Reaches Europe
The perpetrators are currently targeting victims in the UK, Italy, and Spain. Based on their modus operandi, security researchers are now categorizing the scammers as an Advanced Persistent Threat.
New Android Malware Bypasses Multifactor Authentication
MaliBot is targeted at financial fraud. However, the malware needs access to the Android user interface to do so. Via overlay, MaliBot then also bypasses a login in several steps.
Malware From The Online Shop
CRITIS were targeted by cybercriminals in 2021, according to the BKA's federal situation report "Cybercrime". A guest article by Falk Herrmann, CEO of Rohde & Schwarz Cybersecurity.
Ransomware Threat Increases Sharply
Verizon Data Breach Investigations Report 2022: Year-over-year increase in ransomware attacks greater than in the last five years combined.
Aumenta del 14% l’incidenza annua di casi di ransomware
L’incidenza anno su anno di attacchi con ransomware nel mondo aumenta del 14%.
Emotet Leads Malware Detections Worldwide
Spam campaign detections starring Emotet increased by 27% during the first quarter.
RedLine Stealer, il nuovo malware che ruba dati riservati
Rilevato il RedLine Stealer, il nuovo malware che si pone di sottrarre dati riservati.
Emotet Conquers the Malware Top Position
Number of threats detected from malicious Emotet spam campaigns rises 27 per cent.
RedLine Stealer, The New Malware Seeking To Steal Confidential Data
RedLine Stealer detected, new malware that seeks to get its hands on confidential data.
Borat RAT: New Malware Combines Remote Access, Spyware and Ransomware
Hackers are offering Borat RAT for sale on underground forums. The malware allows almost complete control of a system. Its functions range from keyloggers to DDoS attacks.