New MortalKombat ransomware employed in financially motivated campaign

Talos researchers observed a financially motivated threat actor using a new ransomware dubbed MortalKombat and a clipper malware named Laplas. Since December 2022, Cisco Talos researchers have been observing an unidentified financially motivated threat actor deploying two new malware, the recently discovered MortalKombat ransomware and a GO variant of the Laplas Clipper malware. The threat actor […]

The post New MortalKombat ransomware employed in financially motivated campaign appeared first on Security Affairs.

February 16, 2023
Read More >>

Hyundai and Kia to patch a flaw that allows the theft of the cars with a USB cable

Hyundai and Kia car makers are releasing an emergency software update to fix a flaw that can allow stealing a car with a USB cable. Carmakers Hyundai and KIA are rolling out an emergency update for the software shipped with several car models. The update addresses a bug that can be exploited by thieves to […]

The post Hyundai and Kia to patch a flaw that allows the theft of the cars with a USB cable appeared first on Security Affairs.

February 16, 2023
Read More >>

Spam and phishing in 2022

Statistics on spam and phishing with the key trends in 2022: two-stage spear phishing, hijacking of social network and instant messaging accounts, import substitution, and survey phishing.

February 16, 2023
Read More >>

City of Oakland issued a local state of emergency after recent ransomware attack

The City of Oakland has declared a local state of emergency due to the effect of the ransomware attack that hit the city on February 8, 2023. The City of Oakland disclosed last week a ransomware attack, the security breach began on February 8, 2023. In an abundance of caution, the City of Oakland has […]

The post City of Oakland issued a local state of emergency after recent ransomware attack appeared first on Security Affairs.

February 15, 2023
Read More >>

Beep, a new highly evasive malware appeared in the threat landscape

Experts detected a new evasive malware dubbed Beep, it implements many anti-debugging and anti-sandbox techniques. Researchers from Minerva recently discovered a new evasive malware dubbed Beep, which implements many anti-debugging and anti-sandbox techniques. The name Beep comes from the use of techniques involved in delaying the execution through the use of the Beep API function. The experts […]

The post Beep, a new highly evasive malware appeared in the threat landscape appeared first on Security Affairs.

February 15, 2023
Read More >>

Cybersecurity Industry News Review: February 15, 2023

By Joe Fay NHS still recovering from ransomware incidents. Network firm employee confesses to data extortion, as U.S. cyber ambassador admits their Twitter account was hacked as the President turns to industry leaders to advise him. NHS Still Reconnecting After 2022 Lockbit Attack on Supplier Just how disruptive ransomware can be was illustrated this past week, six months after an attack on UK health software supplier Advanced. The attack on Advanced first emerged in August 2022, causing disruption across a range of NHS services. Health and secondary care minister Will Quince said that while most affected NHS organizations were up…

February 15, 2023
Read More >>

AdSense fraud campaign relies on 10,890 sites that were infected since September 2022

The threat actors behind a massive AdSense fraud campaign infected 10,890 WordPress sites since September 2022. In November 2022, researchers from security firm Sucuri reported to have tracked a surge in WordPress malware redirecting website visitors to fake Q&A sites via ois[.]is. The experts were tracking the campaign since September 2022, the campaign’s end goal was black […]

The post AdSense fraud campaign relies on 10,890 sites that were infected since September 2022 appeared first on Security Affairs.

February 15, 2023
Read More >>

What is Virtual Patching and How Does It Work?

Virtual patching uses policies, rules and security tools to block access to a vulnerability until it can be patched. Zero-day threats and legacy systems are two ways that vulnerabilities can be created for which no patch may exist for some time, if ever. In those cases, security teams can block a potential attack path until […]

The post What is Virtual Patching and How Does It Work? appeared first on eSecurityPlanet.

February 14, 2023
Read More >>