by Syndicated News Feed | Feb 20, 2025 | IT Security
A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims’ crypto wallets and steals their login details from web browsers and password managers 20 Feb 2025 ESET researchers have observed a malicious campaign where North...
by Syndicated News Feed | Feb 20, 2025 | IT Security
Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers. After all, what better time to strike than when the potential victim is distracted by the possibility of getting a job? Since...
by Syndicated News Feed | Feb 20, 2025 | IT Security
A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024. The attacks exploited CVE-2024-24919, a Check Point Security Gateway vulnerability, to gain access to...
by Syndicated News Feed | Feb 19, 2025 | IT Security
A US Army soldier suspected of hacking AT&T and Verizon has admitted leaking online people’s private call records. Cameron John Wagenius informed a federal court in Seattle, Wednesday, he intends to plead guilty [PDF] to two counts of unlawfully transferring...
by Syndicated News Feed | Feb 19, 2025 | IT Security
A new JavaScript obfuscation method utilizing invisible Unicode characters to represent binary values is being actively abused in phishing attacks targeting affiliates of an American political action committee (PAC). Juniper Threat Labs that spotted the attack reports...