A team of researchers has identified what appears to be a new method that malicious actors could use to trick users into connecting to their wireless access points (APs).
Source: Read More (SecurityWeek RSS Feed)
A security researcher has published this week a tool to flood Cobalt Strike servers—often used by malware gangs—with fake beacons in order to corrupt their internal databases of infected systems. Named CobaltSpam, the tool was developed by security researcher Mario Henkel. Henkel told The Record today that he created the tool on top of CobaltStrikeParser, a project from security firm […]
Many of the ransomware attacks on industrial and critical infrastructure organizations result in the exposure of operational technology (OT) data that could be useful to threat actors, including to conduct cyber-physical attacks, according to Mandiant. read more Source: Read More (SecurityWeek RSS Feed)
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of phishing attacks that deploy an information-stealing malware called Jester Stealer on compromised systems The mass email campaign carries the subject line “chemical attack” and contains a link to a macro-enabled Microsoft Excel file, opening which leads to computers getting infected with Jester Stealer. Source: […]