Category: Threat Research

Providing Solutions

The Top 10 Ways Ransomware Operators Ramp Up the Pressure to Pay

Ransomware operators don’t just target systems and data, they target people in their ever-increasing efforts to get the victim to pay

Node poisoning: hijacked package delivers coin miner and credential-stealing backdoor

A hacked NPM account was used to deliver Linux and Windows Monero miners and Windows credential-stealing malware along with a popular node.js library.

CryptoRom fake iOS cryptocurrency apps hit US, European victims for at least $1.4 million

Scammers combine romantic lures with crypto scams, abusing Apple’s ad-hoc app distribution to steal millions from people around the world.

Windows Print Spooler gets more patches in October’s Patch Tuesday

Today Microsoft released its latest round of security fixes, addressing 74 vulnerabilities in Microsoft products. Of these, Microsoft’s Security Response Center has classified only two as “critical”—both of which could allow remote code execution in Windows’ Hyper-V virtual machine hypervisor. But all but two of the remainder are classified as “important”, and one is already…
Read more