Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

The Week in Ransomware – January 21st 2022 – Arrests, Wipers, and More
The Week in Ransomware – January 21st 2022 – Arrests, Wipers, and More
The Week in Ransomware – January 21st 2022 – Arrests, Wipers, and More
The Week in Ransomware – January 21st 2022 – Arrests, Wipers, and More

The Week in Ransomware – January 21st 2022 – Arrests, Wipers, and More

The Week in Ransomware – January 21st 2022 – Arrests, Wipers, and More It has been quite a busy week with ransomware, with law enforcement making arrests, data-wiping attacks, and the return of the Qlocker ransomware. This week’s biggest news is Russia’s arrest of fourteen suspected members of the REvil ransomware operation. In addition, a senior Biden

Phishing Impersonates Shipping Giant Maersk to Push STRRAT Malware

Phishing Impersonates Shipping Giant Maersk to Push STRRAT Malware A new phishing campaign using fake shipping delivery lures installs the STRRAT remote access trojan on unsuspecting victim’s devices. Fortinet discovered the new campaign after spotting phishing emails impersonating Maersk Shipping, a giant in the global shipping industry, and using seemingly legitimate email addresses. If the

Over 90 WordPress Themes, Plugins Backdoored in Supply Chain Attack

Over 90 WordPress Themes, Plugins Backdoored in Supply Chain Attack A massive supply chain attack compromised 93 WordPress themes and plugins to contain a backdoor, giving threat-actors full access to websites. In total, threat actors compromised 40 themes and 53 plugins belonging to AccessPress, a developer of WordPress add-ons used in over 360,000 active websites.

‘Anomalous’ Spyware Stealing Credentials in Industrial Firms

‘Anomalous’ Spyware Stealing Credentials in Industrial Firms Researchers have uncovered several spyware campaigns that target industrial enterprises, aiming to steal email account credentials and conduct financial fraud or resell them to other actors. The actors use off-the-shelf spyware tools but only deploy each variant for a very limited time to evade detection. Examples of commodity

× Chat with us