+44 (0)203 88 020 88

Menu

Search

malware

Google Ads Spread Detection Evading Malware

Cyber criminals are abusing the Google Ads system to spread malware in what is known as ‘malvertising’ attacks. As the Google Ads display first before the search results, victims can be conned into clicking onto a fake site when searching for software via Google’s search engine. The malicious websites are designed to impersonate legitimate websites, […]

Google Ads Spread Detection Evading Malware Read More »

Windows Error Reporting Tool Abused to Load Malware

A legitimate Windows executable is being abused by malicious actors to stealthily infect devices with malware without raising any alarms. The Windows Error Reporting tool WerFault.exe can be exploited to load malware onto a system using a DLL sideloading technique in an attack K7 Security Labs have published an analysis for last week. This legitimate

Windows Error Reporting Tool Abused to Load Malware Read More »

Evolving Cyber Security Threats in 2022

The threats faced in cyber security are constantly evolving, with state actors taking part in cyber espionage, and cyber criminal groups creating paid-for campaigns and offering services for hire. The National Cyber Security Centre (NCSC), a part of GCHQ, and the UK government’s technical authority for cyber security, have released their annual review for 2022

Evolving Cyber Security Threats in 2022 Read More »

16 Malicious Android Apps on Google Play Store

A range of malicious adware apps have been found on the Google Play store by security researchers at  McAfee. It is estimated that 20 million installations across 16 different apps occurred before they were identified and subsequently removed from Google Play. These apps contained clicker malware, which runs in the background without the user’s knowledge.

16 Malicious Android Apps on Google Play Store Read More »

Microsoft Azure Vulnerability Exploit in SF Clusters

A spoofing vulnerability in Microsoft Azure Service Fabric can be exploited by attackers to gain admin privileges and take over Service Fabric clusters. Although there are not currently reports of this vulnerability being exploited in the wild, proof of concept (PoC) code for this attack vector does exist. Cloud security platform Orca Security first discovered

Microsoft Azure Vulnerability Exploit in SF Clusters Read More »

Windows Zero-Day Flaw Gets Free Unofficial Patch

An actively exploited zero-day flaw that prevents Windows from properly identifying potentially malicious documents by flagging them as downloaded from the web has been given an unofficial patch. The security issue was first brought to Microsoft’s attention by a security researcher 3 month ago, however no official update to correct this has been released. Security

Windows Zero-Day Flaw Gets Free Unofficial Patch Read More »

Erbium Stealer Malware Sold As A Service

A new information stealing malware is being distributed as malware-as-a-service (MaaS) by threat actors under the guise of fake cheats for popular video games. The malware known as Erbium is designed to harvest the credentials from the victims, stealing passwords and other login information for a range of accounts, including cryptocurrency wallets. Threat researchers CYFIRMA

Erbium Stealer Malware Sold As A Service Read More »

0

No products in the basket.

No products in the basket.