Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 5

Nov 12, 2024

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

Posted by in category: cybercrime/malcode

Ymir ransomware exploits memory management to evade detection, targeting credentials for stealthy network breaches.

Nov 11, 2024

Windows machines are being targeted with ZIP file workaround

Posted by in category: cybercrime/malcode

There is a way to merge multiple ZIP files into one and thus hide malware.

Nov 11, 2024

AI-based authentication scheme can safeguard vehicles from cyber threats

Posted by in categories: cybercrime/malcode, internet, robotics/AI

Scientists have developed an AI-based authentication scheme to enhance vehicle security in the Internet of Vehicles (IoV).


Scientists claim to have developed an artificial intelligence tool to consolidate the privacy of vehicles and their drivers.

How to preserve the privacy of the so-called Internet of Vehicles (IoV) has emerged as a major challenge due to geographical mobility of vehicles and insufficient resources, the scientists say.

Continue reading “AI-based authentication scheme can safeguard vehicles from cyber threats” »

Nov 11, 2024

Quantum Computing Threatens Cybersecurity: Are We Prepared?

Posted by in categories: cybercrime/malcode, quantum physics, supercomputing

As quantum computing grows, researchers are urgently preparing for its impact on cybersecurity by developing quantum-resistant cryptographic protocols.

This research, led by experts at the National Center for Supercomputing Applications, focuses on safeguarding supercomputing infrastructures against quantum threats.

Quantum Computing and Cybersecurity.

Nov 11, 2024

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

Posted by in categories: cybercrime/malcode, internet

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware.

“This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures,” CloudSEK said in a new report.

AndroxGh0st is the name given to a Python-based cloud attack tool that’s known for its targeting of Laravel applications with the goal of sensitive data pertaining to services like Amazon Web Services (AWS), SendGrid, and Twilio.

Nov 11, 2024

Hackers now use ZIP file concatenation to evade detection

Posted by in category: cybercrime/malcode

Hackers are targeting Windows machines using the ZIP file concatenation technique to deliver malicious payloads in compressed archives without security solutions detecting them.

The technique exploits the different methods ZIP parsers and archive managers handle concatenated ZIP files.

This new trend was spotted by Perception Point, who discovered a a concatentated ZIP archive hiding a trojan while analyzing a phishing attack that lured users with a fake shipping notice.

Nov 11, 2024

Quantum cyber threats are likely years away. Why — and how — we’re working today to stop them

Posted by in categories: cybercrime/malcode, mobile phones, quantum physics

This was Mastercard in March: You probably do it every day without a second thought — shop online with your credit card, or install an update on your phone, or send a confidential file to a co-worker.


Mastercard’s efforts include a pilot to test whether quantum key distribution would work on its complex global network.

Nov 10, 2024

This robot mimics humans, cleans washbasins, completes multiple tasks

Posted by in categories: cybercrime/malcode, robotics/AI

By using sensor-embedded sponges and data, Vienna researchers quickly trained robots to clean washbasins.


Thanks to researchers at TU Wein in Vienna, the promise of housecleaning robots is one step closer. The team has developed a self-learning robot to mimic humans to complete simple tasks like cleaning washbasins.

Continue reading “This robot mimics humans, cleans washbasins, completes multiple tasks” »

Nov 9, 2024

Mysterious Mastercard Data Breach Triggers Bank Warning As Customers Urged To ‘Pay Close Attention’ To Money Movements

Posted by in categories: cybercrime/malcode, economics, finance, government

A US bank is warning customers of a security “intrusion” that may have compromised Mastercard account numbers and other financial data.

Maryland-based Eagle Bank says it has received a notice from Mastercard, stating an unnamed US merchant allowed unauthorized access to account information between August 15th, 2023, and May 25th, 2024.

The bank revealed the breach in a filing with the Massachusetts state government.

Nov 9, 2024

US ‘false flag’ operations pollute global cyberspace

Posted by in categories: cybercrime/malcode, governance, internet

Illustration: Liu Rui/GT

China on Monday released its third report on the “Volt Typhoon” investigation. The report not only provides critical new information but also delivers a clearer message to responsible stakeholders concerned with global cyberspace security and governance: A previously underappreciated threat must be taken seriously. This threat originates from US intelligence agencies and security bodies, which, possessing superior technological capabilities, engage in “false flag” operations — activities carried out to deliberately conceal the true origin of cyberattacks while falsely attributing responsibility to someone else, particularly an opponent. To serve their own interests, these organizations openly or tacitly collaborate with high-tech companies.

The Marble Framework mentioned in the latest investigative report was first exposed in 2017 when WikiLeaks claimed to have obtained information from inside the CIA’s Center for Cyber Intelligence. Developed by the CIA as an anti-forensics tool, the primary function of the Marble Framework is to obscure and disguise the true origins of cyberattacks, making it difficult to trace these attacks back to the actual perpetrators. The Marble Framework employs string obfuscation to hide textual information within the malware, as this text often provides forensic experts with clues to identify the developer or country of origin behind the malicious software.

Page 5 of 222First23456789Last