AcidRain Malware Shuts Down Thousands of Modems in Ukraine

Security Intelligence – Security Intelligence – AcidRain Malware Shuts Down Thousands of Modems in Ukraine Home&nbsp/ News AcidRain Malware Shuts Down Thousands of Modems in Ukraine Share On Thursday, February…

Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit

Security Intelligence – Security Intelligence – Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit Threat actors leveraged a malicious Telegram installer to infect users with the Purple Fox…

CEO Fraud Emails – Not Every Money Transfer Request You Receive Is Legit

You know the saying If it’s too good to be true, then it probably is? The same could go with If it’s too pressing to be true, it probably is…

Squid Game Used as Lure for Malware Campaigns, Phishing Attacks

Security Intelligence – Security Intelligence – Squid Game Used as Lure for Malware Campaigns, Phishing Attacks Digital attackers are using Netflix’s popular series “Squid Game” as a lure for their…

Bitdefender Threat Debrief | November 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and research from the previous month. You can find all previous debriefs here. Highlight of the month:…

Triada Trojan Conceals Itself in WhatsApp Mod

Security Intelligence – Security Intelligence – Triada Trojan Conceals Itself in WhatsApp Mod A variant of the Triada Trojan concealed itself within a WhatsApp mod for Android devices, Kaspersky found…

Lazarus Attackers Turn to the IT Supply Chain

Kaspersky researchers saw The North Korean state APT use a new variant of the BlindingCan RAT to breach a Latvian IT vendor and then a South Korean think tank. Lazarus…

Cyber peacekeeping is integral in an era of cyberwar – here’s why

Padlokr –  Padlokr –  Shutterstock Helge Janicke, De Montfort University Cyber warfare is upon us, from interference in elections to a leak of cyber weapons from a national stockpile. And,…

High-Severity Vulnerabilities Now Take Nearly 250 Days to Remediate, Survey Finds

Security Intelligence – Security Intelligence – High-Severity Vulnerabilities Now Take Nearly 250 Days to Remediate, Survey Finds Businesses and agencies today are spending an average of about 250 days to…