National Cyber Warfare Foundation (NCWF) Malware cybersecurity industry news, cyber warfare, collaboration, chat, forums, threat intellignce, known hacking entities, CVEs, ncwf en-us WordPress Injection Anchors Widespread Malware Campaign Williams hacked: FW43-B unveiling by augmented reality cancelled - GPblog Microsoft, FireEye Uncover More Malware Used in the SolarWinds Campaign Compromised Website Images Camouflage ObliqueRAT Malware ObliqueRAT Trojan now lurks in images on compromised websites ObliqueRAT returns with new campaign using hijacked websites Malware Loader Abuses Google SEO to Expand Payload Delivery Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites Go Malware Detections Increase 2000% New Silver Sparrow Malware Infected Nearly 30,000 Apple Macs Go malware is now common, having been adopted by both APTs and e-crime groups 16 technology winners and losers, post-COVID Smashing Security podcast #216: Playboy, prison, and digital ploys – with Garry Kasparov 61% of Malware Delivered via Cloud Apps: Report Mysterious malware infects 30,000 Mac computers 30,000 Macs infected with new Silver Sparrow malware New 'Silver Sparrow' Malware Infected Nearly 30,000 Apple Macs Attackers Already Targeting Apple's M1 Chip with Custom Malware Masslogger Trojan Upgraded to Steal All Your Outlook, Chrome Credentials State of malware: 3 key findings in the latest Malwarebytes report How Joining a Professional Community Can Supercharge Your Career and More Brave New World: Safari Content Blocking Malware Exploits Security Teams' Greatest Weakness: Poor Relationships With Employees Combatting the Growing Cyberthreat of QR Code Abuse The Untold History of America s Zero-Day Market [Heads Up] Growing Collaboration Among Criminal Groups Heightens Ransomware Triple Threat [HEADS UP] NHS Issues Warning as UK COVID-19 Vaccine Scams Are Still Running Rampant When Futurists Get History Wrong, Can They Predict Right? Many of us will be working from home forever NordVPN puts the price tag of stolen streaming subscriptions at $38 million LodaRAT Windows malware now hunting Android devices Inspiring the Next Generation with DigiGirlz Coalition Against Stalkerware | Avast Top Barcode Scanner app infected 10 million users with malware Barcode scanner in Google Play Store became malware after years of popularity, researchers say Barcode scanner in Google Play Store became malware after years of quiet popularity, researchers say The Great Suspender Chrome extension used by millions was malware WARNING Hugely Popular 'The Great Suspender' Chrome Extension Contains Malware Woman pleads guilty for using gov t PC to steal photos of 'snitches' in Iowa Watch out as new Matryosh DDoS botnet hits Android devices Emotet’s Takedown: Have We Seen the Last of the Malware? Microsoft Defender ATP is detecting yesterday's Chrome update as a backdoor A New Linux Malware Targeting High-Performance Computing Clusters 3 top enterprise file encryption programs compared AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down AV-Comparatives Recognizes Avast Business Antivirus Pro Plus | Avast Agent Tesla Trojan ‘Kneecaps’ Microsoft’s Anti-Malware Interface Agent Tesla Malware Spotted Using New Delivery & Evasion Techniques BrandPost: Endpoint Security: Protecting Your Distributed Workforce From Old and New Threats Windows finger command abused to download MineBridge backdoor Authorities plan to mass-uninstall Emotet from infected hosts on April 25, 2021 This malware hides behind free VPN, pirated security software keys Authorities plan to mass-uninstall Emotet from infected hosts on March 25, 2021 North Korea begins human testing its own Covid vaccine developed with information stolen by virus hacker t - The Irish Sun New website launched to document vulnerabilities in malware strains MrbMiner Crypto-Mining Malware Links to Iranian Software Company Microsoft shares how SolarWinds hackers evaded detection - BleepingComputer Cryptocurrency Ransomware Is on The Rise During COVID-19 Here s What Businesses of All Sizes Need to Know About Dealing with Attacks SolarWinds Malware Arsenal Widens with Raindrop Microsoft's Brad Smith says health companies should be off-limits from cyberwarfare - CNET How to Download Research Papers Journals for Free in 2021 Microsoft Patch Tuesday for Jan. 2021 Snort rules and prominent vulnerabilities Fact Check: Is the Argentina COVID video really a virus? - TechJuice New Tool Sheds Light on AppleScript-Obfuscated Malware Emotet reemerges and becomes one of most prolific threat groups out there. [Heads Up] Was SolarWinds Really A Daisy Supply Chain Attack? Over a Third of TMT Firms Hit by Security Breach in 2020 This Elusive Malware Has Targeted Crypto Wallets for a Year - CoinDesk - Coindesk Researchers Disclose Details of FIN7 Hacking Group's Malware - Malware uses WiFi BSSID for victim identification GandCrab Swarm Advanced Malware Multi-Scanning On Premises by OPSWAT Metadefender Core Golang malware infecting Windows, Linux servers with XMRig miner How to block malicious JavaScript files in Windows environments Trends in IT-Security and IAM in 2021, the New Normal and beyond Misconfigured AWS Bucket Exposes Hundreds of Social Influencers Cyber-Attack on European Court of Human Rights Britain's new cyber hacker cell limbers up as gloves come off in global cyber war - Emotet Campaign Restarts After Seven-Week Hiatus The Institute for Security and Technology launches multi-sector Ransomware Task Force Congress Passes Pandemic Aid, UK Virus Variant, US Response To Hack Unclear : Up First - NPR Zero Trust: Not Just for Humans, but Also Machines Business and enterprise anti-virus products put through a long-term test which performed the best? Shadow IT Adds to Remote Work Security Risks Malware infected browser extensions stealing Chrome, Edge user data Cybersecurity Evolves Beyond Antivirus With Morphisec Guard 5.0 Air-Gap Attack Turns Memory Modules into Wi-Fi Radios 3 Million Chrome Users Infected via Extensions Here We Go Again This off the shelf Tor backdoor malware is now a firm favorite with ransomware operators 5 Key Security Challenges Facing Critical National Infrastructure (CNI) Three million users installed 28 malicious Chrome or Edge extensions SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear Exfiltrating Data from Air-Gapped Computers via Wi-Fi Signals (Without Wi-Fi Hardware) Cozy Bears and Hidden Cobras: The hackers targeting COVID-19 vaccine researchers - ABC News Combat Online Predators Act Clears US House New Windows Trojan Steals Browser Credentials, Outlook Files Britain's new offensive cyber hacker cell limbers up as gloves come off in global cyber war - Exposing Modern Client-Side Exploits Serving Kits - An AV and Snort IDS MD5 List Compilation Infostealer Adrozek malware hits Firefox, Chrome, Yandex, Edge browser Juvenile Pleads Guilty to 2016 DNS Attack Defending the Intelligent Edge from Evolving Attacks Data for Real Estate Planners and Professionals: Build it, Hack it, Share it - Boston Real Estate Times 5 minutes with Michael Rezek - Ensuring holiday cyber-readiness Hackers Targeting Companies Involved in Covid-19 Vaccine Distribution Best practices for protecting your data from ransomware UK Orgs Told to Prepare for New Wave of Brexit-Related Scams Mac users warned of more Ocean Lotus malware targeted attacks Malicious npm packages caught installing remote access trojans Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign Phishing Attacks in the U.K. Rise by 73% During Pandemic Months as Vishing and Smishing Attacks Also Increase Kelly Rowland Shares Her Ultimate Mom Hack - Moms Office 365 phishing campaign leverages Oracle and Amazon cloud services Beyond the firewall: Intrusion Detection Systems Three members of TMT cybercrime group arrested in Nigeria Suspected Chinese hackers impersonate Catholic news outlets to gather intel about Vatican diplomacy Chinese APT Group Returns to Target Catholic Church & Diplomatic Groups How Scanners Find Vulnerabilities US Senate Approves New Deepfake Bill In an unusual move, Mozilla asks for public comment about browser privacy In an unusual move, Mozilla asks for public comment about browser privacy feature In an unusual move, Mozilla asks for public comment about global browser privacy setting Book Review: Violence and Trolling on Social Media New Grelos skimmer variant reveals overlap in Magecart group activities, malware infrastructure Chinese APT FunnyDream Runs Riot in Southeast Asia Nibiru ransomware variant decryptor Op protected childhood: 113 online child predators arrested Cyberattackers Serve Up Custom Backdoor for Oracle Restaurant Software ISC West 2021 postponed to July Digging into the Dark Web: How Security Researchers Learn to Think Like the Bad Guys CRAT wants to plunder your endpoints Mercenary APT group CostaRicto hits organizations worldwide CRAT Aims To Plunder Your Endpoints New ModPipe malware targets hospitality, hotel point of sale systems Another Credit Card Stealer That Pretends to Be Sucuri Ghimob banking trojan targeting hundreds of Android apps New 'Ghimob' malware can spy on 153 Android mobile applications Watch Out! New Android Banking Trojan Steals From 112 Financial Apps Israeli lab uses math hack to roll out speedy one-stage pooled virus test - The Times of Israel Coffee Creamer Lid Hack Goes Viral - Moms Brazilian police investigate online hacking of high court - Associated Press IAM: A Critical Element of Corporate Risk Literacy REvil ransomware gang 'acquires' KPOT malware Media Comms Giant Says Ransomware Hit Will Cost Millions Remote Working Exposing Businesses to Unforeseen Threats CISOs face mounting pressure: Here s how to help Malicious npm package opens backdoors on programmers' computers Best new Windows 10 security features: Biometric authentication, Edge browser Wroba Mobile Banking Trojan Spreads to the U.S. via Texts Threat actors are actively exploiting Zerologon flaw, Microsoft warns US Cyber Command details implants used in attacks on parliaments and embassies Home Depot Confirms Data Breach in Order Confirmation SNAFU Protect Your Employees from Business Email Compromise Attacks The Case Against Using a Frankenstein Cybersecurity Platform Officials Warn of Cyberattacks on Hospitals as Virus Cases Spike - The New York Times Take part in the 2021 IT Salary Survey The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products Google removes a set of 21 malicious apps from the Play Store Google Boots 21 Bogus Gaming Apps from Play Marketplace Microsoft IE Browser Death March Hastens 'Among Us' Hacked With Massive Amounts Of Threatening Spam Messages - Moms New Malware Apps on Google Play | Avast Boyne Resorts ski and golf resort operator hit with WastedLocker ransomware Among Us developers scramble to block massive Eris Loris spam attack - The Verge US Treasury sanctions Russian research institute behind Triton malware Among Us hacker Eris Loris's hack forces an emergency Among Us update out of... - The Sportsrush To Err Is Human: Misconfigurations & Employee Neglect Are a Fact of Life Center for Internet Security: Top 10 malware in September 2020 Tech Resume Library: 20 downloadable templates for IT pros 5 Steps for Secure Malware Analysis PayPal Request Money | Avast Building the Human Firewall Thrive Restaurant Group consolidates vendors for hardened security and more efficient operations Mobile Browser Bugs Open Safari, Opera Users to Malware Overlay Malware Targets Windows Users with a DLL Hijack Twist Microsoft released out-of-band Windows fixes for 2 RCE issues QQAAZZ crime gang charged for laundering money stolen by malware gangs Breach at Dickey’s Barbecue Pit compromises 3 million Cards Dickey s PoS Breach Could Hit Three Million Cards Are you ready for AI engineering within EU data regulations? C-SPAN suspends Scully after he admits to lie about hack - The Associated Press Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight Zoom Rolls Out End-to-End Encryption After Setbacks Watchdog urges more FAA action to protect planes from hackers - USA TODAY Trends in Malicious Attachments Used in Phishing Emails Malware gangs love open source offensive hacking tools Malware gangs love open source offensive hacking tools - ZDNet Mobile Malware: What Makes It Dangerous? Russian Cybercrime group is exploiting Zerologon flaw, Microsoft warns Researcher uploaded spyware on official Fitbit store Latest Version of MalLocker Android Ransomware Packs New Tricks Robinhood Users Say Accounts Were Looted, No One to Call - Bloomberg White Hackers Receive Fat Bounty Pay Discovering 55 Apple Vulnerabilities Top anti-virus, anti-malware products contain security flaws Remote Workers Keep IT Issues to Themselves Hacker who helped Islamic State to remain in US prison - Associated Press PoetRAT Resurfaces in Attacks in Azerbaijan Amid Escalating Conflict UEFI malware named MosaicRegressor found on Diplomat computers Israeli and Russian researchers reveal rare malware that targets UEFI firmware - CTech 6 top vulnerability management tools and how they help prioritize threats New 'MosaicRegressor' UEFI Bootkit Malware Found Active in the Wild Malware Families Turn to Legit Pastebin-Like Service Rare Bootkit Malware Targets North Korea-Linked Diplomats Five ways to keep working from home safe for your employees and your company LatAm Banking Trojans Collaborate in Never-Before-Seen Effort Malware campaign poses as Team Blue Take Action email InterPlanetary Storm Botnet Infects 13K Mac, Android Devices COVID-19 Creates Opening for OT Security Reform Linkury adware caught distributing full-blown malware HR and Security: Work together, win together Microsoft: Ransomware & Nation-State Attacks Rise, Get More Sophisticated The Network Perimeter: This Time, It’s Personal 5 top vulnerability management tools and how they help prioritize threats Google removes 17 Android apps designed to deploy Joker malware 16 apps on Google Play Store caught distributing Joker malware Joker Trojans Flood the Android Ecosystem Russia is hacking virus vaccine trials, US, UK, Canada say - Associated Press Confidential Computing: What is it and why do you need it? 8-Year-Old's Neat-Hair Hack - Moms 71% of CISOs Believe Cyber-warfare is a Threat to Their Organization State-Sponsored Iranian Hackers Indicted for Computer Intrusions at US Satellite Companies - Imperial Valley News FBI hopes a more aggressive cyber strategy will disrupt foreign hackers - CyberScoop You're going to be using confidential computing sooner rather than later Mozilla shuts down Firefox Send and Firefox Notes services Hackers have revived a decade-old Microsoft Office exploit - and they re having a field day - TechRadar 7 best practices when selecting a PAM solution Cerberus banking Trojan source code released for free to cyberattackers Career hack for working moms to find balance - Fast Company New MrbMiner malware has infected thousands of MSSQL databases Public disclosure didn't stop suspected Chinese hackers from targeting the Vatican "Hack the Planet!" An Oral History Of Hackers' Soundtrack & Score - Recording Academy Grammys Back Despite Disruption: RedDelta Resumes Operations Stacey Abrams on How We ll Beat Back Voter Suppression Edge computing: The next generation of innovation Zeppelin Ransomware Returns with New Trojan on Board Weave Scope is now being exploited in attacks against cloud environments Is everything you thought you'd done right for security about to be at risk? City of Hartford postpones first day of school after ransomware attack Hartford, Connecticut public schools' first day delayed from ransomware attack Cyber-Criminals Change Tactics to Exploit #COVID19 5G, election hacking and a Java RAT - - Enterprise Times Career roadmap: cyber security engineer Cyber Against Granny Evilnum group targets FinTech firms with new Python-based RAT Contact Tracing: Real and Bogus APT-style mercenary groups challenge the threat models of many organizations The five best Kubernetes security practices Building Hacker-Proof Cars Is the Ambitious Goal of DARPA-Funded Project - autoevolution CRA shuts down online services after thousands of accounts breached in cyberattacks - Tesla Factory Target of Failed Russian Hacking Plot How WeChat Censored the Coronavirus Pandemic