article thumbnail

Black Hat Fireside Chat: The impactful role crowdsourced security intelligence must play

The Last Watchdog

Crowdsourced security vendors (others include Synack, Hacker One and Intigriti) make it seamless for companies to tap into a global network of software coders, and set them on the hunt for vulnerabilities. “What we’ve got under the hood is effectively a dating website for people who are good at breaking into computers,” Ellis says.

article thumbnail

New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer

The Hacker News

Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025.

Software 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security intelligence fosters vulnerability management based on prioritized risk

SC Magazine

But we’re not here to harp on the problem – we want to propose a solution: Using security intelligence to enable risk-prioritized vulnerability management. Prioritize through a risk and security intelligence lens. VM teams need better software tools. And it’s a state of affairs that may persist indefinitely.

article thumbnail

Hackers Exploit Google Ads to Spread Malware Disguised as Popular Software

Penetration Testing

A new report released by AhnLab Security Intelligence Center (ASEC) uncovers a disturbing tactic hackers are using to spread malware: they’re leveraging Google Ads tracking features to redirect unsuspecting users to malicious websites.

article thumbnail

Hackers Weaponize Popular Software Framework for Stealthy Data Theft

Penetration Testing

In a disturbing new development, cybersecurity experts at AhnLab Security Intelligence Center (ASEC) have revealed a growing trend of infostealer malware abusing the Electron framework.

article thumbnail

Best Cybersecurity Software & Tools for 2022

eSecurity Planet

In this article, we’ll cover some of the most important tools to have in your security arsenal and some of the best vendors in each category. Top Cybersecurity Software Benefits of Cybersecurity Software Building Comprehensive Security How to Choose a Cybersecurity Tool. Top Cybersecurity Software. Best XDR Tools.

Software 124
article thumbnail

InnoLoader Malware Evades Detection Posing as Cracked Software

Penetration Testing

The AhnLab Security Intelligence Center (ASEC) has issued a warning about a new breed of malware that disguises itself as cracked software and legitimate tools. Unlike... The post InnoLoader Malware Evades Detection Posing as Cracked Software appeared first on Cybersecurity News.