Microsoft Help Files Are Being Used To Distribute This Spyware

Microsoft Help Files Are Being Used To Distribute This Spyware

Diana Lopera is a researcher for Trustwave Cybersecurity and has stumbled across something that’s one part interesting and one part disturbing. Apparently, a group of hackers are trying a new approach to distribute their malicious code which is leveraging...
New GIMMICK Malware Targets MacOS Users

New GIMMICK Malware Targets MacOS Users

If you follow the global threat landscape closely, then you may already be aware of a notorious Chinese hacking collective known as “Storm Cloud.” What few people know is that this group seems to be the driving force behind a new variant of malware...
A Disguised Windows License Activator May Actually Be Malware

A Disguised Windows License Activator May Actually Be Malware

People who are in the habit of pirating movies and software have something new to worry about.  It seems hackers have begun targeting at least some of them with a ubiquitous form of malware. On the Dark Web, anyone who is willing to shell out twenty bucks or so...
Secure Your SQL Server To Avoid This Malware Infection

Secure Your SQL Server To Avoid This Malware Infection

Do you rely on Microsoft SQL and MySQL databases?  If so, be advised that the cybersecurity firm AhnLab recently published a report about a newly emerging threat. It seems that hackers are now targeting poorly secured Microsoft SQL and MySQLdatabases with a...
Email Phishing Attackers Are Pretending To Be The IRS

Email Phishing Attackers Are Pretending To Be The IRS

Emotet is in the news again according to the latest information from email security firm Cofense.  Emotet is notorious for spreading via phishing campaigns and this latest phishing campaign sees them impersonating the IRS. By all outward appearances, the emails...
This Malware Phishing Campaign Hijacks Email Conversations

This Malware Phishing Campaign Hijacks Email Conversations

Hackers have been using social engineering tricks to get their malicious code onto the systems of unsuspecting victims. This has been happening for almost as long as the internet has been around. It’s one of the most common tactics in use today, primarily...