Remove Encryption Remove Hacking Remove Malware
article thumbnail

Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies

Security Affairs

The Glove Stealer malware exploits a new technique to bypass Chrome’s App-Bound encryption and steal browser cookies. The malware could harvest a huge trove of data from infected systems, including cookies, autofill, cryptocurrency wallets, 2FA authenticators, password managers, and email client information.

article thumbnail

Astaroth malware uses YouTube channel descriptions for hacks

SecureBlitz

In 2020, the digital landscape witnessed a cunning maneuver by the infamous Astaroth malware. Cisco Talos researchers first uncovered this devious strategy, revealing that Astaroth embedded encrypted and […] The post Astaroth malware uses YouTube channel descriptions for hacks appeared first on SecureBlitz Cybersecurity.

Malware 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 16

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.

Malware 121
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 17

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.

Malware 116
article thumbnail

New Perfctl Malware targets Linux servers in cryptomining campaign

Security Affairs

perfctl malware targets misconfigured Linux servers to deploy cryptocurrency miners and proxyjacking software in an ongoing campaign. Aqua Nautilus researchers shed light on a Linux malware, dubbed perfctl malware, that over the past 3-4 years targeted misconfigured Linux servers. ” reads the report.

Malware 134
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 22

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.

Malware 68
article thumbnail

A generative artificial intelligence malware used in phishing attacks

Security Affairs

HP researchers detected a dropper that was generated by generative artificial intelligence services and used to deliver AsyncRAT malware. While investigating a malicious email, HP researchers discovered a malware generated by generative artificial intelligence services and used to deliver the AsyncRAT malware.