A spate of cryptocurrency-mining malware that affected Windows systems, Linux machines, and routers have been identified last September . The malware variants employed a variety of methods to hide and spread their malicious mining activities.
Organizations can still fall victim to targeted attacks because of the increasing sophistication of tactics and tools threat actors use to breach the network perimeter. What can you do to stay protected?
Three hospitals of the DCH Health System were hit by a ransomware attack on October 1, forcing the medical institutions to turn away noncritical patients while they work to securely restore their affected IT systems.
A zero-day attack exploits an unpatched vulnerability. Until a patch becomes available, it is often a race between threat actors trying to exploit the flaw and vendors or developers rolling out a patch to fix it.
The FDA notified patients, healthcare professionals, and other stakeholders, warning them of a set of 11 vulnerabilities that could put medical devices and hospital networks at risk.
CVE-2019-16928, a vulnerability involving the message transfer agent Exim, could result in threat actors being able to launch denial-of-service (DoS) or remote code execution (RCE) attacks.
A security researcher discovered that an unpatchable exploit in the bootrom of iOS devices, including iPhone 4S to iPhone X, can be used to jailbreak the devices.
A couple discovered that their Nest security system was hacked after their thermostat was repeatedly set to high temperatures despite being adjusted and the hacker started talking to them via the camera.
Emotet (detected by Trend Micro as TrojanSpy.Win32.EMOTET.THIBEAI) which recently resurfaced, is quick to expand its campaign to bank on the popularity of former CIA contractor and NSA whistleblower Edward Snowden’s bestselling memoir.