Cyber Security News

Malware Loader Passes Through “Heaven’s Gate”
Date

Malware Loader Passes Through “Heaven’s Gate”

According to a blog article published by security researcher’s based at Cisco Talos, a new malware loader has been seen in the wild specifically designed to hide in plain sight and allow the payload to evade detection by anti-malware solutions by injecting into the memory of compromised computers be

EA Rushes to Fix Cloud Flaws
Date

EA Rushes to Fix Cloud Flaws

EA, undoubtedly one of the world’s major players in the games industry in terms of both releases and sales, is not immune to security issues, like with any company reliant on the Internet. The company has a reputation for generating bad press, whether from business practices or unfulfilled promises

GandCrab v5.2 Decryptor Released
Date

GandCrab v5.2 Decryptor Released

We have followed the exploits of the GandCrab operators with keen interest on this platform. We covered how Bitdefender and Europol worked together to develop and release a decryptor for GandCrab versions 1 (GDCB extension), 4 (KRAB extension), and 5 (random 10-character extension), however, none ex

Malware Hidden in Medical Imagery
Date

Malware Hidden in Medical Imagery

The healthcare sector has come under increasing fire over recent years. This fire was caused by numerous cybersecurity incidents, from breaches to malware infections affecting critical service delivery. Now the US Department of Homeland Security’s National Cybersecurity and Communications Integratio

European Internet Traffic Rerouted to Chinese ISP
Date

European Internet Traffic Rerouted to Chinese ISP

On Thursday, June 6, 2019, for approximately two hours a large amount of European Internet traffic was rerouted through the infrastructure of China Telecom, China's third-largest telco and internet service provider (ISP). According to experts, the traffic was rerouted following a BGP route leak at S

How Hackers Profit from Stolen Medical Information
Date

How Hackers Profit from Stolen Medical Information

It is almost a weekly occurrence that a company announces they have suffered a data breach. Oven the numbers, in the millions, are difficult for us to wrap our heads around. Besides this, the cost to the individual affected by such a breach can be hidden within the sheer scope of these large numbers

BlackSquid Emerges from the Deep
Date

BlackSquid Emerges from the Deep

When the developers behind Coinhive announced that they would be shutting down the service of allowing websites to mine cryptocurrency rather than advertising, the rise of cryptominers was predicted by some to end. The development of Coinhive opened a Pandora’s Box and drove the abuse and developmen

HiddenWasp Targeting Linux
Date

HiddenWasp Targeting Linux

Over the years there have been numerous examples of distributed denial of service (DDoS) designed to be executed on Linux machines and servers. With the advent of the Internet of Things, the number of devices available to be controlled by attackers has skyrocketed and along with it numerous versions

Bitcoin Scam Leads to Ransomware Infections
Date

Bitcoin Scam Leads to Ransomware Infections

According to security researcher going by the pseudonym Frost, a bunch of websites is pushing a download which promises users the ability to earn up to 30 USD in Bitcoin daily. The program, called Bitcoin Collector, is nowhere near what it is advertised to be, rather it is a scam which will infect s