Malicious Extortion Bot Targets Publicly Exposed PostgreSQL and MySQL Databases

The bot gains access to the databases, deletes all tables and databases, and leaves a ransom note demanding payment for data recovery. However, the bot only saves a small portion of the data, even if the ransom is paid.

Cyware News – Latest Cyber News – ​Read More

Weaponized AWS SES Accounts Anchor Massive Stealth Attack

In today’s cloud, it seems, every convenience for customers is equally convenient to those who’d abuse these services for malicious purposes.

darkreading – ​Read More

TA866 Returns with a Large Email Campaign

The new campaign by TA866 involved a large volume of emails with attached PDFs containing OneDrive URLs that initiated a multi-step infection chain leading to malware payload.

Cyware News – Latest Cyber News – ​Read More

What is a TPM, and why does your PC need one?

Windows 11 requires a Trusted Platform Module. Here’s why.

Latest stories for ZDNET in Security – ​Read More

Report: 75% of Organizations Hit by Ransomware in 2023

Cyberattacks are the leading cause of technology outages for 40% of organizations, emphasizing the need for comprehensive disaster preparation beyond just cybersecurity measures, according to Veeam.

Cyware News – Latest Cyber News – ​Read More

Russian APT Known for Phishing Attacks Is Also Developing Malware, Google Warns

Russian threat group ColdRiver has developed Spica, a malware that enables it to compromise systems and steal information. 

The post Russian APT Known for Phishing Attacks Is Also Developing Malware, Google Warns appeared first on SecurityWeek.

SecurityWeek – ​Read More

Oleria Secures $33M Investment to Grow ID Authentication Business

Seattle identity and authentication startup Oleria has attracted renewed interest from venture capital investors.

The post Oleria Secures $33M Investment to Grow ID Authentication Business appeared first on SecurityWeek.

SecurityWeek – ​Read More

iShutdown Method Allows to Discover Spyware Infections on iPhones

The presence of spyware, such as Pegasus, Predator, and Reign, can be identified by examining the Shutdown.log file for anomalous log entries related to processes delaying the reboot.

Cyware News – Latest Cyber News – ​Read More

Bigpanzi Botnet Infects 170,000 Android TV Boxes With Malware

The malware tools used by Bigpanzi, including ‘pandoraspear’ and ‘pcdn,’ enable the cybercriminals to hijack DNS settings, establish C2 communication, build a peer-to-peer CDN, and execute DDoS attacks on infected devices.

Cyware News – Latest Cyber News – ​Read More

FTC Joins Global Data Security and Privacy Investigative Consortium

This nonbinding consortium aims to assist privacy investigators worldwide and facilitate seamless collaboration in law enforcement investigations and actions involving privacy and data security.

Cyware News – Latest Cyber News – ​Read More