Tag: redline
Rescoms rides waves of AceCryptor spam
Last year ESET published a blogpost about AceCryptor – one of the most popular and prevalent cryptors-as-a-service (CaaS) operating since 2016. For H1 2023...
Breaking News
Evasive Jupyter Infostealer Campaign Showcases Dangerous Variant
Security researchers have spotted a recent increase in attacks involving a sophisticated new variant of Jupyter, an information stealer that has been targeting users...
Ducktail Infostealer, DarkGate RAT Linked to Same Threat Actors
Cybersecurity researchers have uncovered a connection between the notorious DarkGate remote access trojan (RAT) and the Vietnam-based financial cybercrime operation behind the Ducktail infostealer.WithSecure's...
Anodot Unveils CostGPT to Help Businesses Better Manage Cloud Costs – Finovate
Analytics and monitoring solutions company Anodot has launched CostGPT to help businesses monitor cloud costs. Anodot’s CostGPT leverages AI to enable business managers...
Security Breach of $3 Million Hits Stars Arena Backed by Avalanche
Stars Arena, a social platform supported by Avalanche’s Contract Chain, recently faced a major security breach. The official Stars Arena Twitter account confirmed...
Stars Arena Drained of $2.85 Million, Declaring ‘War’ with Hackers – Decrypt
Stars Arena, a social platform backed by Avalanche’s Contract Chain, has been hit with what the project calls a “major security breach.”Launched last month...
Airbus Investigates Data Breach Affecting 3,200 Vendor Associates
Kamso Oguejiofor-Abugu Published on: September 15, 2023 In a recent cybersecurity incident, Airbus, the European aerospace titan, has...
Stealer Thugs Behind RedLine & Vidar Pivot to Ransomware
Two cybercriminal groups well-established in the business of spreading infostealers are diversifying their capabilities, abusing code-signing certificates to spread stealer malware, and then pivoting...
ESET Research Podcast: Sextortion, digital usury and SQL brute-force
ESET Research Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims...
The Dark Web Is Expanding (As Is the Value of Monitoring It)
Many security professionals today associate the Dark Web with named leaks, which are leaked credentials from employee password reuse. This is still a relevant...
Crypto Industry Ripe for Fradusters, BlackBerry Stops 1.5 Million Attacks in 2 Months: Report
Blackberry has detected several malware families that are being used to run massive campaigns for stealing crypto from devices.
In the August edition of...
BlackBerry Unveils Top Cryptocurrency-Focused Malware Amid Rising Cyber Threats – Investor Bites
SNEAK PEEK
SmokeLoader, RaccoonStealer, and Vidar are top cryptocurrency-focused malware. Finance, healthcare, and government are most targeted by cyberattacks. OpenAI allocates $1 million to...
You may not care where you download software from, but malware does
One of the pieces of advice that security practitioners have been giving out for the past couple of decades, if not longer, is that...