Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 AttacksWe discuss the Batloader malware campaigns we observed in the last quarter of 2022,...
Month: January 2023
Friday Squid Blogging: Squid-Inspired Hydrogel
Friday Squid Blogging: Squid-Inspired HydrogelScientists have created a hydrogel “using squid mantle and creative chemistry.” As usual, you can also use this squid post to talk...
Myth-busting Antivirus Software Assumptions
Myth-busting Antivirus Software Assumptions The number of new viruses grows every day. In fact, McAfee registers an average of 1.1 million new malicious programs and potentially unwanted apps...
NIST Is Updating Its Cybersecurity Framework
NIST Is Updating Its Cybersecurity FrameworkNIST is planning a significant update of its Cybersecurity Framework. At this point, it’s asking for feedback and comments to its...
Earth Bogle: Campaigns Target the Middle East with Geopolitical Lures
Earth Bogle: Campaigns Target the Middle East with Geopolitical LuresWe discovered an active campaign ongoing since at least mid-2022 which uses Middle Eastern geopolitical-themed lures to...
Celebrate National Download Day With This Safe Downloading Checklist
Celebrate National Download Day With This Safe Downloading Checklist Happy Download Day! (Yes, there’s a day for that.) Today is an excellent day to share downloading...
Start the New Year Right With This 3-Step Digital Detox
Start the New Year Right With This 3-Step Digital Detox Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st...
Everything You Need to Know About Identity Remediation
Everything You Need to Know About Identity Remediation There are no ifs, ands, or buts about it: A stolen identity creates a mess. Once they have...
How To Recognize An Online Scam
How To Recognize An Online Scam It’s been a particularly busy and colourful week, scam-wise in our household. Between 4 family members, we’ve received almost 20...
Protecting Your Privacy This Year
Protecting Your Privacy This Year If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal...
Your Guide to Protecting Your Credit
Your Guide to Protecting Your Credit It has a way of sneaking up on you. Credit theft and fraud. Maybe it’s happened to you. Maybe it’s...
“Payzero” Scams and The Evolution of Asset Theft in Web3
“Payzero” Scams and The Evolution of Asset Theft in Web3In this entry, we discuss a Web3 fraud scenario where scammers target potential victims via fake smart...
40 Years of the Internet – Tips for Staying Safe Online in 2023
40 Years of the Internet – Tips for Staying Safe Online in 2023 Authored by Vonny Gamot The official 40th birthday of the internet serves as...
3 Tools to Round Out Your Privacy Protection Toolbox
3 Tools to Round Out Your Privacy Protection Toolbox It’s common practice to pull down the window shades at night. Homeowners invest in high fences. You...
The Big Difference Between Online Protection Software and Antivirus
The Big Difference Between Online Protection Software and Antivirus Authored by Dennis Pang Online protection software. Antivirus. The two words get used interchangeably often enough. But...
New Year, New You: Start Fresh With McAfee Protection Score
New Year, New You: Start Fresh With McAfee Protection Score Are you an online oversharer? Do you give your full birthday to all your online shopping...
The Case for Your Security at CES 2023
The Case for Your Security at CES 2023 As technology weaves itself into our lives in new and unexpected ways, some of it will get quite...
Vice Society Ransomware Group Targets Manufacturing Companies
Vice Society Ransomware Group Targets Manufacturing CompaniesIn this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that...
Protecting the Universal Remote Control of Your Life—Your Smartphone
Protecting the Universal Remote Control of Your Life—Your Smartphone Aside from using it for calls and texting, we use our smartphones for plenty of things. We’re...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
The PayPal Breach – Who Was Affected and How You Can Protect Yourself PayPal recently notified thousands of its customers that their accounts were breached by...
What Should You Do if Your Identity Has Been Stolen?
What Should You Do if Your Identity Has Been Stolen? It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll...
The Rise and Risks of AI Art Apps
The Rise and Risks of AI Art Apps Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures,...
Prevent advanced ransomware attacks with good email security
Prevent advanced ransomware attacks with good email securityThis report explains that phishing and social engineering attacks remain the biggest threats to organizations and how to overcome...
Can Apple Macs get Viruses?
Can Apple Macs get Viruses? It’s a long-standing question. Can Apple computers get viruses? While Apple does go to great lengths to keep all its devices...
ChatGPT: A Scammer’s Newest Tool
ChatGPT: A Scammer’s Newest Tool ChatGPT: Everyone’s favorite chatbot/writer’s-block buster/ridiculous short story creator is skyrocketing in fame. 1 In fact, the AI-generated content “masterpieces” (by AI...
Attacking The Supply Chain: Developer
Attacking The Supply Chain: DeveloperIn this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain:...
Your Data—It’s the Story of You
Your Data—It’s the Story of You All your online activity creates a trail of data. And that data tells a story. The story of you. The...
North Korea’s Top APT Swindled $1B From Crypto Investors in 2022
North Korea's Top APT Swindled $1B From Crypto Investors in 2022Contenido de la entradaLeer másProofpoint News Feed
Do you use OneDrive or Google Drive? Watch out for this malware
Do you use OneDrive or Google Drive? Watch out for this malwareContributed by George Mack, Content Marketing Manager, Check Point Software. A recent report has revealed...
New Mimic Ransomware Abuses Everything APIs for its Encryption Process
New Mimic Ransomware Abuses Everything APIs for its Encryption ProcessTrend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything,...