New GIMMICK Malware Targets MacOS Users

New GIMMICK Malware Targets MacOS Users

If you follow the global threat landscape closely, then you may already be aware of a notorious Chinese hacking collective known as “Storm Cloud.” What few people know is that this group seems to be the driving force behind a new variant of malware...
A Disguised Windows License Activator May Actually Be Malware

A Disguised Windows License Activator May Actually Be Malware

People who are in the habit of pirating movies and software have something new to worry about.  It seems hackers have begun targeting at least some of them with a ubiquitous form of malware. On the Dark Web, anyone who is willing to shell out twenty bucks or so...
Secure Your SQL Server To Avoid This Malware Infection

Secure Your SQL Server To Avoid This Malware Infection

Do you rely on Microsoft SQL and MySQL databases?  If so, be advised that the cybersecurity firm AhnLab recently published a report about a newly emerging threat. It seems that hackers are now targeting poorly secured Microsoft SQL and MySQLdatabases with a...
Email Phishing Attackers Are Pretending To Be The IRS

Email Phishing Attackers Are Pretending To Be The IRS

Emotet is in the news again according to the latest information from email security firm Cofense.  Emotet is notorious for spreading via phishing campaigns and this latest phishing campaign sees them impersonating the IRS. By all outward appearances, the emails...
This Malware Phishing Campaign Hijacks Email Conversations

This Malware Phishing Campaign Hijacks Email Conversations

Hackers have been using social engineering tricks to get their malicious code onto the systems of unsuspecting victims. This has been happening for almost as long as the internet has been around. It’s one of the most common tactics in use today, primarily...
Hackers Get Source Code During Data Breach At Samsung

Hackers Get Source Code During Data Breach At Samsung

Samsung’s corporate network was breached recently.  That’s bad news all by itself. The company has recently confirmed that in addition to the confidential customer information that was stolen, the hackers also made off with the source code for the...