GitHub Users Targeted with Dimnie Trojan
Developers sharing code on GitHub are being targeted in a malicious email campaign that’s infecting their computers with a modular trojan known as Dimnie. GitHub users first started noticing andRead More →
Developers sharing code on GitHub are being targeted in a malicious email campaign that’s infecting their computers with a modular trojan known as Dimnie. GitHub users first started noticing andRead More →
Increasingly, cyberattackers have been leveraging “non-malware” attack methods to target vulnerable organizations. Recently, the Carbon Black Threat Research Team was alerted about such an attack by a partner’s incident responseRead More →
Polish banks are frantically scanning their workstations and servers while checking logs in the search of signs of infection after some of them noticed unusual network activity and unauthorised files on keyRead More →
Malicious Word document with ‘Russian doll’ technique targets NATO countries. Security researchers have identified a hacking campaign seemingly targeted at NATO members, which employs a sophisticated method to infect victimsRead More →
Browser autofill profiles are a reliable phishing vector that allow attackers to collect information from users via hidden fields, which the browser automatically fills with preset personal information and whichRead More →
DNSChanger causes network computers to visit fraudulent domains. As you read these words, malicious ads on legitimate websites are targeting visitors with malware. But that malware doesn’t infect their computers,Read More →
The San Francisco Municipal Transportation Agency (SFMTA) was hit with a ransomware attack on Friday, causing fare station terminals to carry the message, “You Hacked. ALL Data Encrypted.” Turns out, theRead More →
A new set of official US Air Force photographs confirm the flying branch’s biggest spy planes are helping hunt Islamic State fighters. The missions come as Iraqi and Kurdish troopsRead More →
A surprising number of critical infrastructure participants do, too, study finds. A surprisingly large number of critical infrastructure participants—including chemical manufacturers, nuclear and electric plants, defense contractors, building operators andRead More →
France’s TV5Monde came “within hours” of being destroyed by hackers, according to the station’s boss. TV5Monde was taken off air for hours in April 2015. The interruption might haveRead More →