25 Feb Microsoft: Resetting Windows devices might not wipe all data Microsoft says Windows customers might find that some of their files are not deleted after resetting their Windows devices with the “Remove everything” option. […]
24 Feb US and UK expose new malware used by MuddyWater hackers US and UK cybersecurity and law enforcement agencies today shared info on new malware deployed by the Iranian-backed MuddyWatter hacking group in attacks targeting critical infrastructure worldwide. […]
24 Feb Microsoft Exchange servers hacked to deploy Cuba ransomware The Cuba ransomware operation is exploiting Microsoft Exchange vulnerabilities to gain initial access to corporate networks and encrypt devices. […]
24 Feb Defense contractors hit by stealthy SockDetour Windows backdoor A new custom malware dubbed SockDetour found on systems belonging to US defense contractors has been used as a backup backdoor to maintain access to compromised networks. […]
24 Feb Ransomware used as decoy in data-wiping attacks on Ukraine The new data wiper malware deployed on Ukrainian networks in destructive attacks on Wednesday right before Russia invaded Ukraine earlier today was, in some cases, accompanied by a GoLang-based ransomware decoy. […]
24 Feb Malware infiltrates Microsoft Store via clones of popular games A malware named Electron Bot has found its way into Microsoft’s Official Store through clones of popular games such as Subway Surfer and Temple Run, leading to the infection of 5,000 computers in Sweden, Israel, Spain, and Bermuda. […]
23 Feb NSA-linked Bvp47 Linux backdoor widely undetected for 10 years A report released today dives deep into technical aspects of a Linux backdoor now tracked as Bvp47 that is linked to the Equation Group, the advanced persistent threat actor tied to the U.S. National Security Agency. […]
23 Feb Network hackers focus on selling high-value targets in the U.S. A Crowdstrike report looking into access brokers’ advertisements since 2019 has identified a preference in academic, government, and technology entities based in the United States. […]
23 Feb New data-wiping malware used in destructive attacks on Ukraine Cybersecurity firms have found a new data wiper used in destructive attacks today against Ukrainian networks just as Russia moves troops into regions of Ukraine. […]
23 Feb Ransomware extortion doesn’t stop after paying the ransom A global survey that looked into the experience of ransomware victims highlights the lack of trustworthiness of ransomware actors, as in most cases of paying the ransom, the extortion simply continues. […]