
Malicious Chrome extension steals all data
There’s a glut of malicious Google Chrome extensions out there, but some are more harmful than others. The one that SANS ISC incident handler Renato Marinho has dubbed …

Top threats impacting endpoint security decisions
Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats …

NotPetya successor Bad Rabbit hits orgs in Russia, Ukraine
Bad Rabbit ransomware, apparently modeled on NotPetya, has hit a number of organizations across Russia, Ukraine, and Eastern Europe on Tuesday. Russian security outfit …

MacOS Proton backdoor delivered via Trojanized media player app
A Trojanized version of Elmedia Player software for Mac was available for download for who knows how long from the developer’s official site, ESET researchers have …

Millions download botnet-building malware from Google Play
Researchers have discovered a new batch of malicious apps on Google Play, some of which have been downloaded and installed on some 2.6 million devices. The apps’ …

Android DoubleLocker ransomware encrypts data, changes device PIN
A new piece of ransomware is targeting Android users. Dubbed DoubleLocker, it both encrypts users’ files and changes the device’s PIN. About DoubleLocker Lukáš …

Compromised analytics provider made Equifax’s site point to malware
Yesterday’s revelation that Equifax’s credit report assistance Web page was spotted redirecting visitors to malware resulted in the company temporarily disabling …

Equifax’s site hacked to redirect info-seeking visitors to adware
Here’s the last incredible-but-not-really Equifax security blunder: it appears that their Web site has been hacked, and made to redirect to site serving adware …

Dark web ransomware economy: Sellers pulling in six-figure salaries
There are currently more than 6,300 estimated dark web marketplaces selling ransomware, with more than 45,000 current product listings, according to new research by Carbon …

Inside the Middle Eastern and North African cybercriminal underground
Trend Micro researchers investigated the Middle Eastern and North African cybercriminal underground, and found that prices for malware and hacking tools are generally a bit …

Defense contractors, manufacturers targeted with malware-as-a-service infostealer
Information stealing FormBook malware is being lobbed at defense contractors, manufacturers and firms in the aerospace sector in the US and South Korea. Delivery methods The …

The global impact of huge cyber security events
The past 12 months have seen a number of unprecedented cyber-attacks in terms of their global scale, impact and rate of spread. Already causing widespread public concern, …