Tag
#The Hacker News
A recently discovered wave of malware attacks has been spotted using a variety of tactics to enslave susceptible machines with easy-to-guess administrative credentials to co-opt them into a network with the goal of illegally mining cryptocurrency. "The malware's primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they've been infected,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/LNnBCXKL1w0" height="1" width="1" alt=""/>
2020 was a year of relentless disruptions. The protective layer of secured enterprise networks and controlled IT environments of the physical premises did not exist. Over the past year, CISOs (Chief Information Security Officers) have had to grapple with the challenges of bolstering the security posture, minimizing risks, and ensuring business continuity in the new normal. The rise in volumes<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/CoRyQi7Q1kE" height="1" width="1" alt=""/>
A spam campaign delivering spear-phishing emails aimed at South American organizations has retooled its techniques to include a wide range of commodity remote access trojans (RATs) and geolocation filtering to avoid detection, according to new research. Cybersecurity firm Trend Micro attributed the attacks to an advanced persistent threat (APT) tracked as APT-C-36 (aka Blind Eagle), a suspected<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/0xlymO1MaG4" height="1" width="1" alt=""/>