Chinese hackers launch Linux variant of PingPull malware
Chinese state-sponsored threat actor Alloy Taurus has introduced a new variant of PingPull malware, designed to target Linux systems, Palo Alto Networks said in its research.
Chinese state-sponsored threat actor Alloy Taurus has introduced a new variant of PingPull malware, designed to target Linux systems, Palo Alto Networks said in its research.
So-called 'malvertising' is the exact reason why Apple wants you to use its App Store.
In the first seven months of this year, threat actors stole over 50 million passwords, two billion cookie files, details of 103,150 bank cards, and data from 113,204 crypto wallets.
A group of attackers, likely based in Vietnam, that specialises in targeting employees with potential access to Facebook business has re-emerged.
Distributing malware inside password-protected archives has long been one of the main techniques used by attackers to bypass email security filters.
The sophisticated rootkit malware infects system firmware to avoid detection and has claimed victims in China, Iran, Vietnam and Russia.
WithSecure has sounded the alarm about a new type of Facebook malware that attempts to compromise business accounts for financial gain.
Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.
Nerbian RAT malware uses significant anti-analysis and anti-reversing capabilities along with multiple open source Go libraries to conduct malicious activity.
Researchers believe the group behind TrickBot are moving the infected devices it controls to the newer, more difficult to detect Emotet malware.
ShadowPad came into the spotlight in 2017 when used in two software supply-chain attacks by a suspected Chinese state-sponsored hacker group.
Attackers are still exploiting unaddressed vulnerabilities in an estimated 300,000 MikroTik routers. A new tool will detect compromised devices.
The vulnerability affects not only Java-based applications and services that use the library directly, but also many other popular Java components.
Multiple groups are compromising Windows web servers and deploying malware programs to function as extensions for Internet Information Services.
Gootloader component infects computers by hijacking Google search results to send victims to legitimate but compromised websites.