Hackers somehow got their rootkit a Microsoft-issued digital signature

Cybersecurity researchers at Bitdefender have detailed how cyber criminals have been using FiveSys, a rootkit that somehow made its way through the driver certification process to be digitally signed by Microsoft.  …

This monster of a phishing campaign is after your passwords

Microsoft has detailed an unusual phishing campaign aimed at stealing passwords that uses a phishing kit built using pieces of code copied from other hackers’ work. A “phishing kit” is…

TA551 Shifts Tactics to Install Sliver Red-Teaming Tool

A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment. The criminal threat group known as TA551 has added the Sliver…

Palo Alto warns of BEC-as-a-service, finds average wire fraud attempted is $567,000 with peak of $6 million

Business email compromise (BEC) continues to cost victims thousands — and sometimes millions — of dollars, according to a new report from Palo Alto Networks’ threat research group Unit 42.…

US to Ban Export of Hacking Tools to Authoritarian States

US to Ban Export of Hacking Tools to Authoritarian States The US government has issued new rules designed to prevent the export of hacking and surveillance tools to regimes guilty…

TA505 Gang Is Back With Newly Polished FlawedGrace RAT

TA505 – cybercrime trailblazers with ever-evolving TTPs – have returned to mass-volume email attacks, flashing retooled malware and exotic scripting languages. The TA505 cybercrime group is whirring its financial rip-off…

Explosive New MirrorBlast Campaign Targets Financial Companies

Key Points:  Morphisec Labs tracked a new MirrorBlast campaign targeting financial services organizations  MirrorBlast is delivered via a phishing email that contains malicious links which download a weaponized Excel document…

HP Wolf report highlights widespread exploitation of MSHTML, typosquatting and malware families hosted on Discord

Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and seriousness. There can now be millions — or even billions — of dollars at…

How Quantum Computing Will Impact Cybersecurity

The field of quantum computing is still in its early stages, but the technology will be impacting many industries much sooner than most people realize. Quantum computers are able to…

International cryptocurrency scam ring targets European dating app users

An international scam ring is targeting dating app users in a romance scam to not only deprive victims of their cryptocurrency but also the control of their handsets.  On Wednesday,…