The number of victims posted on ransomware extortion sites rose more than 20% in December to 241 organizations — the highest monthly count since April, according to data collected by Recorded Future.
According to ESET researchers, attackers use a fake Shagle website that tricks victims into downloading the malicious APK file. In reality, the app is a trojanized version of the standard Telegram app for Android.
AnyDesk is a popular remote desktop application for Windows, Linux, and macOS, used by millions of people worldwide for secure remote connectivity or performing system administration.
S-RM researchers identified a Lorenz ransomware attack that was completed months after the attackers gained initial access. They exploited CVE-2022-29499, a vulnerability in Mitel telephony infrastructure.
The CISA has added two more security vulnerabilities to its catalog of exploited bugs, one of which affects Microsoft Exchange and the second one is in Windows Advanced Local Procedure Call.
More than 10,000 beneficiaries of a local branch of the French social security agency CAF, or Family Allowance Fund, saw their data exposed for about 18 months, after a file containing personal information was sent to a service provider.
The US Supreme Court gave the green light on Monday for WhatsApp to pursue a lawsuit against NSO Group, the Israeli surveillance company, for installing the Pegasus spyware on roughly 1400 devices where WhatsApp was also installed.
The starting point of the cyber assault is to direct users searching for healthcare-related keywords to an infected WordPress blog that tricks them into downloading malware-laced ZIP files.
A comprehensive analysis of the cryptographic protocols used in the Swiss encrypted messaging application Threema has revealed a number of loopholes that could be exploited to break authentication protections and even recover users’ private keys.
The StrongPity group has been found using a fake website since 2021 that impersonates the actual Shagle site to trick victims into downloading a malicious Android. Once installed, this app enables hackers to conduct espionage on the targeted victims.