The unmasking of the Styx Stealer
Check Point encountered a curious malware case: The security researchers at Check Point Research (CPR) discovered that the developer of the new malware Styx Stealer made a serious mistake during debugging that leaked data from his computer.
Ad
Security breach or hysteria?
An alleged hack at data broker National Public Data (NPD) made headlines this week for potentially exposing billions of social security numbers. Real leak or hysteria?
Ad
Industrial Control Systems (ICS)
Thousands of industrial control systems (ICS) in the USA and the UK are vulnerable to cyber attacks. Critical infrastructure, such as the water supply, is also affected.
The latest analysis from Cato CTRL reveals alarming developments in the cybersecurity landscape. The threat actor “IntelBroker” emerges as a central figure in selling stolen data and source code, and also plays a prominent role in hacking forums.
Advanced Persistent Threats (APT)
The FBI has launched an investigation after Donald Trump’s presidential campaign claimed to have been attacked by Iranian hackers. Proofpoint security researcher Joshua Miller explains the possible background.
Ad
Attention Android users
Android users should beware of the new BingoMod malware. This disguises itself as a security app and can steal money, delete data and completely take over the infected device.
Over 105,000 malware samples detected
Zimperium, a security expert in real-time protection for mobile devices, has discovered a new and potent threat identified as SMS Stealer. Zimperium’s zLabs team uncovered the malware during routine analysis and has now detected it in over 105,000 malware samples from more than 600 global brands.
Mandrake malware sneaks in again
Kaspersky experts have discovered a new spyware campaign that spreads the malware ‘Mandrake’ in Google Play. The malware disguises itself as legitimate apps for cryptocurrencies, astronomy or utility tools.
Biggest-ever leak of digital pirates
The Cybernews research team discovered an unprotected database containing the data of almost 10 million users. The database belongs to an attacker called Z-lib, which operates a malicious clone of Z-Library.
Ad

Events

Veranstaltungen

19.02.2025
 - 20.02.2025
Berlin

Most read articles.

Ad
Ad
Ad
Ad