Google compensates victims of cryptomining up to $1 million
Victims of a cryptomining attack in their Google Cloud, can now seek financial compensation. The compensation rises to a maximum of one million dollars.
Google is launching the Cryptomining Protection Program. The program provides financial protection for all Google Cloud users. They can receiv... Read more
’55 percent more vulnerability exploits in 2022′
Palo Alto Networks' Unit 42 research team reports on the malware trends it saw in 2022 and early 2023. The rise of ChatGPT has led to an explosion of impersonation attempts and website exploits aimed at exploiting AI hype. It is also seen that many more exploitations of vulnerabilities occurred in ... Read more
Discord reports data breach after support agent hacked
Discord has recently alerted its users about a data breach. According to the popular communications app, the breach is a result of a compromised third-party support agent account.
This breach exposed the support ticket queue. This contained sensitive information such as user email addresses, mes... Read more
Microsoft is rolling out a series of fixes for 0-day Secure Boot bug
According to Microsoft's planning, the entire bug fix process will take a year to complete.
This week Ars Technica reported on Microsoft's latest plan to eliminate a serious vulnerability affecting the boot process on various types of Windows machines. The vulnerability can be exploited by a pie... Read more
Millions of phones already infected by malware out-of-the-box
Trend Micro researchers have discovered that millions of Android phones already contain malicious firmware from the factory. They revealed this during the Black Hat Asia conference in Singapore.
The Register has reported on the proceedings in Singapore. Most of the affected devices appear to be ... Read more
Goldoson malware infiltrates 60 Google Play apps
A new malicious Android malware known as "Goldoson" has infiltrated the Google Play Store, infecting 60 apps with a total of 100 million downloads.
The harmful Goldoson component is part of a third-party library which all sixty apps use this and that creators unintentionally included i... Read more
Israeli threat actor hacks civil society in 10 countries, reports say
Two new threat analyses expose a new player in the field of targeted hacking for intelligence gathering.
New research published this week by Microsoft and the internet watchdog Citizen Lab detail the operations of a new Israeli spyware company targeting journalists, politicians, opposition figur... Read more
Microsoft Defender identifies Google and Zoom as malicious
The Windows native security app had "gone rogue" and was misidentifying legitimate URLs as malicious.
This week Microsoft confirmed that its Defender security platform, which is delivered as a part of its Windows operating system, was mistakenly tagging legitimate websites.
On Wednesday, Micr... Read more
Acronis integrates Intel TDT technology for greater CPU efficiency
Acronis has integrated Intel Threat Detection Technology into several solutions. With this, this security vendor's platform offers better protection against new and more developed forms of malware.
According to Acronis, malware is becoming increasingly sophisticated. Consider the rapid rise of s... Read more
Emotet malware now distributed by Microsoft OneNote email attachments
The move intends to bypass Microsoft security restrictions and infect more targets. Emotet is a notorious malware botnet that has historically been distributed through Microsoft Word and Excel attachments that contain malicious macros.
If a user opens the attachment and enables macros, a DLL w... Read more