Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Malvertising Targets Chinese-Speaking Users

Researchers at Malwarebytes warn that a malvertising campaign is targeting Chinese-speaking users with phony ads for encrypted messaging apps. The ads impersonate apps that are restricted in China, such as Telegram or LINE. “The threat actor is abusing Google advertiser accounts to create malicious ads and pointing them to pages where unsuspecting users will download Remote Administration Trojan (RATs) instead,” Malwarebytes says.

Transforming and Securing Healthcare with Rubrik

With the digitalization of patient data, the healthcare industry has significantly improved and transformed healthcare processes. This shift to digital data has brought many benefits, like improved quality of care, reduction in errors, and improved communication. However, the shift to digitalization has also led to the exponential collection of data, which is primarily unstructured. To put things in perspective, a typical healthcare and life sciences organization manages over 32.6 million sensitive files.

Meet AZORult Stealer: High Risk, Open Source & Evolving

AZORult stealer was first discovered in 2016 and is regarded as a high-risk Trojan-type virus created to collect private data. Over time,the AZORult stealer evolved into a free, open-source program. We discovered advertising with instructions for installing the stealer in “TheJavaSea” and “Nulled” within the prominent Darknet forums. AZORult, one of the most dominant stealers, has taken the place of honor among the top 5 stealers worldwide in the last couple of years.

Rubrik Celebrates a Major Milestone, and So Do I

A pair of round number milestones has made me deeply reflective about my life and that of Rubrik. In October, I turned 50. And ten years ago today, my Co-Founders and I started Rubrik. I want to talk more about the second landmark first because it’s not just a personal watershed but a notable one as well for our customers, partners, colleagues, and investors. Let me take you back to Monday, January 27, 2014, which seems like yesterday and long ago at the same time.

The dark side of 2023 Cybersecurity: Malware evolution and Cyber threats

In the ever-evolving cybersecurity landscape, 2023 witnessed a dramatic surge in the sophistication of cyber threats and malware. AT&T Cybersecurity Alien Labs reviewed the big events of 2023 and how malware morphed this year to try new ways to breach and wreak havoc. This year's events kept cybersecurity experts on their toes, from expanding malware variants to introducing new threat actors and attack techniques.

NCSC Warns That AI is Already Being Used by Ransomware Gangs

In a newly published report, the UK's National Cyber Security Centre (NCSC) has warned that malicious attackers are already taking advantage of artificial intelligence and that the volume and impact of threats - including ransomware - will increase in the next two years. The NCSC, which is part of GCHQ - the UK's intelligence, security and cyber agency, assesses that AI has enabled relatively unskilled hackers to "carry out more effective access and information gathering operations...

The Number of Ransomware Attack Victims Surge in 2023 to over 4000

The surge in Ransomware-as-a-Service affiliates is likely the reason behind the dramatic increase in the number of victimized organizations, with all indicators suggesting that this trend will persist into 2024. I love it when vendors put out a yearly summary, and do it in the first month of the next year! The data is relevant and helps paint a picture of what the industry should expect in the near future. In Cyberint’s 2023 Ransomware Recap report, we find that ransomware had quite the year.

Underground Alliances: State-Sponsored Hacking & Ransomware Realities Unveiled | Razorthorn Security

Uncover the covert world of state-sponsored hacking in our latest video. Explore how decent hacking groups showcase their skills, often in the realm of ransomware, to secure sponsorships through discreet back channels. These partnerships, sometimes with organizations linked to government-affiliated entities, provide the green light to target perceived adversaries. Has the spotlight dimmed on these activities? Quite the contrary – it's expanding.

Akira Ransomware-as-a-Service (RaaS) targeting Swedish organizations

Recent ransomware attacks on European organizations have attracted significant attention, primarily due to the involvement of threat actors with Russian connections or origins. Of particular concern is the latest attack on an IT service provider, which has had a profound impact on Swedish companies, government agencies, and municipalities.

Twelve Common Types of Malware

Malware is malicious software that cybercriminals use to infect a victim’s device. Cybercriminals use malware to gain control of the device, damage it or steal sensitive information. They use different types of malware to infect and exploit a user’s device. Some common types of malware include ransomware, Trojans, spyware and keyloggers. Continue reading to learn more about these types of malware, how they get delivered and how to stay protected from them.