Remove Cryptocurrency Remove Firmware Remove Phishing
article thumbnail

IT threat evolution Q1 2022

SecureList

MoonBounce: the dark side of UEFI firmware. Late last year, we became aware of a UEFI firmware-level compromise through logs from our firmware scanner (integrated into Kaspersky products at the start of 2019). The campaign has two goals: gathering information and stealing cryptocurrency. Targeted attacks.

Phishing 134
article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Vulnerabilities and Malware Primarily includes severe and exploited vulnerabilities in devices or software used by end users (ex: a major router firmware flaw). Malware campaigns covered generally target/affect the end user.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: Endpoint Security: Protecting Your Distributed Workforce From Old and New Threats

CSO Magazine

The attacks are becoming more insidious, such as malware that modifies itself to infiltrate a system and hit a specific target, along with attacks directed at firmware. Ransomware attacks also are up, as is crypto-jacking, where a hacker hijacks an endpoint’s processing power to mine cryptocurrency.

article thumbnail

Security Affairs newsletter Round 374 by Pierluigi Paganini

Security Affairs

Critical flaw in Netwrix Auditor application allows arbitrary code execution CISA urges to fix multiple critical flaws in Juniper Networks products Threat actors exploit a flaw in Digium Phone Software to target VoIP servers Tainted password-cracking software for industrial systems used to spread P2P Sality bot Experts warn of attacks on sites using (..)

Firmware 118
article thumbnail

Security Affairs newsletter Round 352

Security Affairs

Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini. SecurityAffairs – hacking, newsletter). The post Security Affairs newsletter Round 352 appeared first on Security Affairs.

article thumbnail

Nastiest Malware 2024

Webroot

The rise of AI-driven phishing and social engineering, increased targeting of critical infrastructure, and the emergence of more sophisticated fileless malware are all trends that have shaped the cybersecurity battlefield this year. Keep Software Updated: Enable automatic updates for your operating system, applications, and security software.

Malware 108
article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

The attackers’ research vector is now shifting from software vulnerabilities to those located at the hardware and firmware level. In 2017-2018 hackers’ interest in cryptocurrency exchanges ramped up. Thus, 60% of the total amount was stolen from Coincheck , a Japanese cryptocurrency exchange. Attacks on Crypto.