In late 2019, a new strain of malware called “Valak” was detected. In the six months that followed its initial discovery in the wild, more than 30 variants of the code were detected. Initially, Valak was classified as a simple loading program. As various groups have tinkered with the code, …
Update NinjaForms In WordPress To Avoid Potential Hack
Are you one of the million-plus website owners making use of Ninja Forms for WordPress? If so, be aware that the company has recently patched a serious security flaw that allowed hackers to inject malicious code and take over websites. The attack is accomplished via a Cross-Site Request Forgery (CSRF) …
Illegal Movie Downloads Can Give Your Device Malware
If you’re like a lot of people stuck at home during the pandemic, you probably ran out of Netflix titles to watch a couple of weeks ago. As a result, researchers have noted a huge surge in traffic to torrent sites as more and more people are drawn to downloading …
Agent Tesla Malware Steals WiFi Passwords From Infected Users
A few new variants of the Agent Tesla info-stealer malware have been spotted in the wild and should be on your radar if they’re not already. The new variants are more dangerous than previous versions of the malware. They now sport a module that enables them to scrape WiFi passwords …
Hackers Targeting WooCommerce Users To Steal Credit Card Information
WooCommerce is a WordPress-based, free plugin that makes it incredibly easy to sell just about anything online. With more than five million installations, it’s clearly a favorite on the web. Unfortunately, its popularity also makes it an easy target. Ben Martin and Willem de Groot are researchers with Sanguine Security. …
Huge Increase In Phishing And Malware Attacks Using Coronavirus
Around the world, hundreds of millions of people are terrified of the current pandemic that’s raging. Most of those are currently self-quarantining at home and limiting their social contacts. Everyone is hungry for news and information. Sadly, hackers, scammers and other assorted criminals have wasted no time preying on this …
Be On The Lookout As Astaroth Malware Makes A Comeback
Are you familiar with Astaroth? If you’re a data security professional, you’ve probably at least heard the name. The group gained some notoriety last year when it came to light that they had developed a means of spreading “fileless malware” using legitimate Windows tools to infect machines around the world. …
Coronavirus Health Notifications Being Used To Carry Malicious Threats
A Pakistani-based hacking group that goes by a variety of names, including “Transparent Tribe,” “APT36,” “Mythic Leopard” and others has been discovered to be behind a particularly nasty attack recently. Researchers with QiAnXin’s RedDrip Team discovered a phishing campaign bearing the group’s stamp. This new campaign utilizes poisoned files that …
Malware Is Targeting Cookies On Android Devices To Gain Access
There’s a new malware threat to be aware of, called “CookieThief,” which is an apt name that describes what the malware does. Honestly though, the Hackers missed the mark here. “CookieMonster” would have been a much better name option. In any case, it’s part of a growing new collection of …
Hackers Are Capitalizing On Coronavirus
Cybercriminal activity is always evolving, and now hackers are banking on the novel coronavirus having potential victims distracted when clicking a link. Hackers are capitalizing on fears and the quest for information by creating malicious websites disguised as popular COVID-19 maps. When unsuspecting users click on the map, they are …