The issue of a trusted insider betraying a trust either maliciously or for commercial gain is a problem we often discussed at university and never really came up with an answer. You need trusted people for any business to operate – you should use the “principle of least privilege” to …
Malware targets cryptocurrency wallets and browsers
The PennyWise malware is masquerading as crypto-coin mining software and being advertised in a variety of YouTube videos – showing that any communications method can be exploited for phishing attacks. PennyWise malware on YouTube targets cryptocurrency wallets and browsers | TechRepublic To help build confidence in the product, the threat …
Continue reading “Malware targets cryptocurrency wallets and browsers”
Researchers discover a long-term cyber espionage campaign originating in China
Researchers uncover years-long espionage campaign targeting dozens of global companies – The Record by Recorded Future The US Justice Department and the FBI have received information from researchers at Cyberreason, of a long term infiltration of dozens of unnamed North American companies, for purposes of stealing company secrets and IP. …
Continue reading “Researchers discover a long-term cyber espionage campaign originating in China”
Redline information stealer malware targets Internet Explorer
Emotet is among the most distributed malware in March, Redline malware has been being deployed extensively by hackers in April 2022, specifically targeted at Internet Explorer More than 10,000 Redline malware attacks in April targeting Internet Explorer vulnerability – The Record by Recorded Future RedLine malware can steal login credentials …
Continue reading “Redline information stealer malware targets Internet Explorer”