26 May Hackers phish finance orgs using trojanized Minesweeper clone Hackers are utilizing code from a Python clone of Microsoft’s venerable Minesweeper game to hide malicious scripts in attacks on European and US financial organizations. […]
25 May Arc browser’s Windows launch targeted by Google ads malvertising A new Google Ads malvertising campaign, coinciding with the launch of the Arc web browser for Windows, was tricking people into downloading trojanized installers that infect them with malware payloads. […]
25 May Indian man stole $37 million in crypto using fake Coinbase Pro site An Indian national pleaded guilty to wire fraud conspiracy for stealing over $37 million through a fake Coinbase website used to steal credentials. […]
24 May Hacker defaces spyware app’s site, dumps database and source code A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data. […]
24 May Cencora data breach exposes US patient info from 11 drug companies Some of the largest drug companies in the world have disclosed data breaches due to a February 2024 cyberattack at Cencora, whom they partner with for pharmaceutical and business services. […]
24 May Cencora data breach exposes US patient info from 8 drug companies Some of the largest drug companies in the world have disclosed data breaches due to a February 2024 cyberattack at Cencora, whom they partner with for pharmaceutical and business services. […]
24 May New ShrinkLocker ransomware uses BitLocker to encrypt your files A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt corporate systems using Windows BitLocker. […]
24 May Google fixes eighth actively exploited Chrome zero-day this year Google has released a new emergency security update to address the eighth zero-day vulnerability in Chrome browser confirmed to be actively exploited in the wild. […]
23 May JAVS courtroom recording software backdoored in supply chain attack Attackers have backdoored the installer of widely used Justice AV Solutions (JAVS) courtroom video recording software with malware that lets them take over compromised systems. […]
23 May Microsoft spots gift card thieves using cyber-espionage tactics Microsoft has published a “Cyber Signals” report sharing new information about the hacking group Storm-0539 and a sharp rise in gift card theft as we approach the Memorial Day holiday in the United States. […]