The crypto-miner Nitrokod escapes detection by security researchers for years. However, according to Check Point, the infection route can also be used for more dangerous malware such as ransomware.

The crypto-miner Nitrokod escapes detection by security researchers for years. However, according to Check Point, the infection route can also be used for more dangerous malware such as ransomware.
Trend Micro: Ransomware attacks on Linux and embedded systems in double digits.
Scams target potential investors in Germany, the Netherlands, the UK, Belgium, Portugal as well as other countries in Europe.
Enterprises are being highly targeted with sophisticated DDoS attacks. Critical payloads are being reached faster.
The cyber extortionists are active in the USA and Europe. They demand ransoms in the seven-figure range. When compromising networks, Zeppelin proceeds very carefully.
The top malware strains include remote access Trojans (RATs), banking Trojans, info stealers and ransomware.
Business decision-makers are unable to assess their digital attack surfaces due to complexity.
HP Wolf Security Report reveals new techniques and phishing lures used to deceive employees.
Groups LockBit, Hive and BlackCat compromised the network within about two weeks. Apparently, they each use the same hacked RDP connection. Only after the third attack the company approached Sophos for help.
Attractive target for ransomware groups as attacks can be life-threatening and ransom demands are more likely to be paid.
Unknown persons penetrate the company's network. Beforehand, they hacked the Google account of a Cisco employee and obtained VPN access data. The ransomware group Yanluowang claims responsibility for the attack.
Three quarters of respondents believe recent changes in working practices have had a negative impact on their company's cyber security.
More than 1.5 million victims decrypt their data for free thanks to Europol initiative. In the meantime, No More Ransom offers decryption tools for 165 ransomware variants.
"It's not worth paying", says Reiner Dresbach of Cybereason in his commentary on ransom demands after ransomware attacks.
Series of attacks shows how cybercriminals are infecting computers worldwide via unpatched firewalls and VPN services.
Current study by YesWeHack shows status quo in terms of cyberattacks on banks, insurance companies and financial service providers in the DACH region.
Visitors to the sites are being redirected to fraudulent websites.
Due to complexity, business decision-makers are unable to assess their digital attack surfaces.
Seventy percent of enterprises struggle to keep up with the volume of security alerts.
Das Amt für Informatik baut ein kantonales Zentrum für Cybersicherheit auf, das die Verwaltung und weitere Zielgruppen gegen Cyberangriffe schützen soll.
Its awareness kit on the dangers lurking on internet platforms includes articles, videos, a communication plan and calendar, indications and tips.
Security awareness trainings sensitise the entire team to phishing, ransomware and secure remote working.
Group uses technique to bypass blocking of their URLS. Huge growth in phishing attacks compared to 2022.
Database also contains police files and medical records. The source is allegedly the Shanghai Police Department. Sellers are demanding 10 bitcoin for a presumed 23 TByte of data.
Growing threat of attacks combined with skills shortages frustrates security teams.
Google's Threat Analysis Group (TAG) blocks malicious domains and websites that hack-for-hire groups use to attack high-risk targets.
Symantec associates the Bumblebee loader with the Conti, Mountlocker, and Quantum ransomware groups. Bumblebee is currently spreading via phishing emails with malicious file attachments.
Präventionsmassnahmen haben dazu geführt, dass 82 Prozent der als sehr schwerwiegend eingestuften Angriffe keine Folgen hatten.
Researchers from CrowdStrike uncover an attack on the VoIP appliance MiVoice. In the process, they find a zero-day vulnerability. Mitel now protects its customers from attacks with a script.
Homograph phishing attacks use similar characters to impersonate another website.