loading=”lazy” width=”400px”>Um sich vor Ransomware-Angriffen zu schützen, sollten Unternehmen ihre Logins absichern. Fit Ztudio – shutterstock.com Ransomware bleibt eine der größten Gefahren für Unternehmen – […]
Author: cyberbytes
Top-Tipps für die erfolgreiche Nutzung von Bedrohungsdaten
Mit STIX und TAXII werden Bedrohungsdaten nicht nur übertragen, sondern strategisch nutzbar gemacht. Gorodenkoff – shutterstock.com Unternehmen, die der Flut von Sicherheitsverletzungen und Angriffen Einhalt […]
NSO Group’s Legal Loss May Do Little to Curtail Spyware
The $168 million judgment against NSO Group underscores how citizens put little store in the spyware industry’s justifications for circumventing security — but will it […]
Attackers Lace Fake Generative AI Tools With ‘Noodlophile’ Malware
Threat actors are scamming users by advertising legitimate-looking generative AI websites that, when visited, install credential-stealing malware onto the victim’s computer. The original article found […]
New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms
Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as a lure. Dubbed Noodlophile Stealer, this previously undocumented infostealer targets unsuspecting […]
Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques
Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware has evolved with sophisticated PowerShell tools and advanced evasion tactics, leveraging […]
4 Hackers Arrested After Millions Made in Global Botnet Business
The cybercriminals infected older wireless Internet routers with Anyproxy and 5socks malware in order to reconfigure them — all without the users’ knowledge. The original […]
APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations
The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing campaign targeting activists focused on North Korean issues. Named “Operation: […]
Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns
The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black Banshee,” has been active since at least 2012, targeting nations like […]
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable an attacker to leverage the software in […]