Chrome 80 blocks popular data-stealing malware AZORult
Buying login data through the Genesis Store was, for a long time, largely possible through a malware strain called AZORult. Ninety percent of acquired credentials would be captured using that specific malware, after which Google took action: with Chrome 80, the malware will no longer work.
Resea... Read more
‘For the first time, there is more malware on Mac than on Windows’
Macs are no longer the machines with significantly fewer viruses. For the first time since the advent of Apple devices, the company has overtaken Windows in terms of the amount of detected malware.
The number of threats specific to Macs has risen sharply over the past year. Research conducted by... Read more
‘Free’ movies popular as a phishing and malware tool
'Click here to see Joker for free', that's how users recently have been tempted to click on a link. They are then directed to a website where they have to fill in a lot of personal information before they can download a strange file. After that, they don't get the movie, but they do get a whole bun... Read more
More than half a million PCs affected by malware hosted on Bitbucket
Bitbucket, the git-code hosting service, has been abused by hackers. As a result, some 500,000 computers worldwide have been infected with malware. This incident was unveiled by discoveries made by Cybersecurity firm Cybereason.
The hacking campaign involves the use of malware hosted on Bitbucke... Read more
Mobile malware wriggling towards top cyber threats
A rare event, albeit not a positive one: For the first time in three years, a mobile trojan has been able to penetrate the top ten of most threatening malware at this moment. XHelper focuses specifically on Android users.
Last month's Global Threat Index features Check Point Software Technologie... Read more
ESET has the expertise, but also a central position in Europe
During the recent ESET Press Tour in Bratislava, we
received an update about what the security company is currently doing and what
the plans for the future are. Last year we were also present, and then, it
turned out that the company had a clear vision about where it wanted to go in
the future: to ... Read more
New trojan gives attackers control over Windows systems
A newly discovered trojan focuses on organisations in health care and education. It is a tailor-made, Python-based trojan that gives attackers control over Windows systems. This gives them the ability to control actions and steal sensitive data.
The trojan gives hackers remote access, and is cal... Read more
Hackers mine Monero cryptic currency through Docker vulnerability
A group of hackers is scanning the entire Internet to find vulnerabilities in certain systems that use enterprise sandbox software. They then use the vulnerabilities to minimise cryptographic currency, in this case the Monero cryptographic currency.
According to security researchers at Bad Packe... Read more
Advanced Dexphot malware infects 80,000 computers
A new type of malware has appeared on the market that has already caused quite a few casualties. The new malware is called Dexphot, and was discovered by Microsoft security researchers. The malware reached its peak in June, when it had infected almost 80,000 computers.
Dexphot has been active si... Read more
Juniper Threat Labs discovers new malware
Juniper Threat Labs has discovered a new Trojan that
spreads spyware. The spyware uses Telegram to get stolen information. By using
Telegram as a Command and Control (CnC) channel, the malware has the potential
to infect the devices of some 200 million active users every month.
The malware is ca... Read more