AI Zero-days Threats Detection

New Shlayer Malware Variant Targeting Macs

Security researchers have found a new variant of a trojan program dubbed Shlayer that infects Mac computers and disables the macOS Gatekeeper security agent. Shlayer was discovered a year ago by researchers ...
Security Boulevard
phishing cybersecurity

Trojan Infects Browser Extensions After Disabling Integrity Checks

Security researchers have discovered a new Trojan program dubbed Razy that installs itself as a browser extension or infects existing browser extensions after disabling integrity checks. According to researchers from Kaspersky Lab, ...
Security Boulevard
phishing, AI-based fraud, fraud, friendly fraud, SolarWinds hackers

Email Spam Campaign Targets U.S. Retail, Restaurant Sectors

A cybercriminal group has launched a malware campaign via personalized spear-phishing emails against large retail, restaurant and grocery chains in the United States, as well as against other organizations from the food ...
Security Boulevard
Russia Microsoft phishing AWS Ukraine

APT28 Pulls Out New Malware Cannon

The notorious Russian cyberespionage group known as APT28, Fancy Bear and Sofacy is targeting government organizations using a new Trojan program called Cannon. Researchers from Palo Alto Networks detected new spear-phishing campaigns ...
Security Boulevard
data security. identity,organization, survey, data, data governance, data privacy, data security, AI, FTC data broker geolocation

Spyware Pushers Modify Equation Editor Exploit to Bypass AV Detection

In a case that shows you can teach an old exploit new tricks, a group of attackers who push information-stealing malware modified a well-known exploit in a way that it bypasses detection ...
Security Boulevard
Cyberespionage Campaign in Ukraine Uses Free and Custom RATs

Cyberespionage Campaign in Ukraine Uses Free and Custom RATs

Security researchers have been tracking a sustained cyberespionage campaign against Ukrainian government institutions that uses a combination of free and custom-made remote access Trojans (RATs). The malware programs involved in the years-long ...
Security Boulevard
Insecure Elasticsearch Nodes Host Malware Command-and-Control Servers

Insecure Elasticsearch Nodes Host Malware Command-and-Control Servers

More than 4,000 misconfigured Elasticsearch nodes, most of them running on Amazon Web Services’ platform, have been hijacked by attackers to host malware command-and-control servers. The compromised nodes were discovered by researchers ...