Researchers constructed a malware that runs even on a shutdown iPhone
Researchers have managed to craft malware, particularly for iPhone, which continues to operate even when the device is turned off.
Every time you switch off your iPhone, think again if you're really safe from all the possible hackers. When an iPhone is switched off, it doesn't completely shut do... Read more
Over 100 Lenovo laptop models have security flaws
On Tuesday, Lenovo announced security patches for more than 100 laptop models to address significant vulnerabilities that allow sophisticated hackers to install malicious software that is nearly hard to delete or detect in some circumstances.
Hackers may be able to change a computer's ... Read more
Cybercriminals spread Inno Stealer malware through Google Search
A report by CloudSEK describes how cybercriminals spread a new infostealer through Google Search.
Fake web pages are regularly used to spread malware. Until recently, the Google search results for 'Windows 11 upgrade' contained a fake Microsoft website with a fraudulent download link for Windows... Read more
Google bans apps with hidden data-harvesting code from the Play Store
Google has removed hundreds of applications from its Google Play store after discovering that they have a software component that collects data covertly.
Measurement Systems S. de R.L., the Panamanian business that produced the malware, is connected to a Virginia defense contractor that offers c... Read more
SentinelOne discovers AcidRain malware targeting wind turbines
SentinelOne recently discovered 'Acid Rain', a new wiperware variant . The malware focuses on disrupting the (satellite) communication of wind turbines.
According to the security specialist, AcidRain was found in as many as 5,800 wind turbines belonging to wind energy organization Enercon. Affec... Read more
New Linux botnet exploits Log4j
The malware uses DNS tunneling for communications
A recently discovered botnet under active development targets Linux systems, attempting to ensnare them into an army of bots ready to steal sensitive info, installing rootkits, creating reverse shells, and acting as web traffic proxies.
The ne... Read more
BazarBackdoor malware is now being spread via website contact forms
The new delivery vector makes the malware even more difficult to detect.
The stealthy BazarBackdoor malware is now being spread via website contact forms rather than typical phishing emails, according to a report in bleepingcomputer.com. The new delivery method helps the malware to evade detecti... Read more
A Google Play app with more than 10,000 downloads carried remote access trojan
According to a security firm, a malicious program downloaded more than 10,000 times from Google Play installed a remote access malware that collected users' passwords, text messages, and other private data.
The trojan, which goes by the aliases TeaBot and Anatsa, was discovered in May of last ye... Read more
‘Cyberattacks are developed more quickly, damage is rising’
The development cycle and damage of cyberattacks is ramping up. This is concluded by Fortinet in a security analysis of the second half of 2021.
The research shows that hackers are developing attacks at an increasing pace. The damage of attacks is growing along.
An important example of the in... Read more
Malware attacks via Excel XLL files rose by nearly 600 percent
Cyber attacks based on Microsoft Excel add-in files (.XLL) increased by nearly 600 percent in 2021. In a new report, security researchers at HP Wolf Security disclose how the file type is being exploited.
Excel add-in files (.XLL) allow DLL files to be opened within Excel sheets. Cybercriminals ... Read more