Microsoft blocks MSIX protocol handler
Microsoft has again blocked the MSIX ms-appinstaller protocol handler to prevent hackers from using it to infect Windows environments with ransomware.
Microsoft's research shows that malware attacks on Windows environments again exploit the CVE-2021-43890 Windows AppX Installer spoofing vulnerab... Read more
Android malware bypasses biometric scan and steals phone PIN
The so-called Chameleon malware is not new, but it has worrying new capabilities. Android users can download an otherwise normally functioning app without ever realizing that Chameleon is running in the background.
Discovered in April, Chameleon is known as a "banking trojan," an umbrella term f... Read more
Google Chrome has Safety Check: controls and needs control
Google is working on the security of the Chrome browser for the desktop. The functionality of the feature is mainly scanning for threats. But further actions are a task for the user.
The latest update for Chrome adds the Safety Check feature to the browser. This feature always runs in the backgr... Read more
Qakbot malware returns with phishing attack on hospitality industry
The infamous Qakbot malware has made a return. Microsoft Threat Intelligence warns of new phishing emails purporting to be from the U.S. Internal Revenue Service (IRS).
In late August, international police units announced they had eliminated the giant Qakbot botnet during "Operation Duck Hunt." ... Read more
‘Most cyber attacks hide in encrypted web traffic’
Most cyber-attacks take place with malware hidden in encrypted web traffic. This is what Zscaler found out in its ThreatLabz 2023 State of Encrypted Attacks Report.
According to Zscaler's annual report, the spread of cyber threats via encrypted (HTTPS) web traffic is increasing every year. In 20... Read more
Digging deeper into software artifacts
Software has artifacts. Spelled in correct English we would talk about artefacts, but because most of the planet's software artefacts exist (or were created in Silicon Valley), we tend to embrace the Americanization and say artifacts. But what are software artifacts, why do they exist in the first ... Read more
Research: Malware no longer biggest cyberthreat to SMBs
For SMBs, malware is surprisingly no longer the biggest cyberthreat. It is now primarily the use of legitimate software, Huntress Labs researchers find.
According to the researchers, malware is strikingly causing fewer and fewer security incidents among SMBs. In just over half of the cases studi... Read more
Malware-as-a-Service BunnyLoader sends your sensitive data in a ZIP to hackers
Zscaler ThreatLabz has discovered a new Malware-as-a-Service threat. The malware is listed for sale on various forums for $250.
The malware BunnyLoader was recently discovered by security researchers at Zscaler ThreatLabz. On devices where the malware is active, hackers record keyboard activity... Read more
DarkGate malware targets Skype and Microsoft Teams
The so-called DarkGate malware not only attacks Skype accounts but also spreads through affected Microsoft Teams accounts.
Between July and September of this year, Skype accounts have been the target of attacks with the DarkGate malware, Trend Micro discovered. This malware enables the spread o... Read more
Sponsored WebEx search result is the source of malware infection
A fake Google Search result for the Cisco WebEx software causes victims to download the BatLoader malware. This malware, in turn, installs the DanaBot trojan.
According to Malwarebytes' security experts, a fake Google Ads campaign has been active for a week, providing a fake search result for th... Read more