The Raccoon Stealer malware is back with an updated version, with added functionality and capabilities. This malware is offered as malware-as-a-service (mimicking a legitimate business model), enabling less well equipped threat actors to implement sophisticated cyber security attacks. Expect the use of this malware to increase as threat actors, looking for …
Now the ransomware gangs are offering bug bounties
It is an accepted practice for software vendors to offer a bug bounty to people who discover a flaw in their software, and report it to them. The vendor can then, hopefully, fix the vulnerability before a threat actor can exploit it. Now the ransomware gangs are at it – …
Continue reading “Now the ransomware gangs are offering bug bounties”
Cybersecurity and Infrastructure Security Agency exploited vulnerability advisory
The US Cybersecurity and Infrastructure Security Agency has added eight new vulnerabilities to it’s Known Exploited Vulnerabilities Catalog. CISA Adds Eight Known Exploited Vulnerabilities to Catalog | CISA
Google Threat Assessment Group tackles smartphone malware
This is a follow-up to last week’s story: New commercial spyware for phones – Smart Thinking Solutions This is Google describing how they countered the Hermit smartphone malware and discusses their Project Zero for countering zero-day threats. Spyware vendor targets users in Italy and Kazakhstan (blog.google) Your best defence against …
Continue reading “Google Threat Assessment Group tackles smartphone malware”
How does ransomware get into my system? I’m careful!
Of course the threat actors use social engineering techniques and phishing emails: Fake copyright infringement emails install LockBit ransomware (bleepingcomputer.com) Ransomware is probably the biggest cyber security threat facing businesses today. Coming soon: Five essential skills you need to do your own cybersecurity – A Masterclass Are you facing cyber …
Continue reading “How does ransomware get into my system? I’m careful!”