The FBI has released a high-priority public alert warning that millions of home internet-connected devices are being compromised by a powerful botnet known as BADBOX 2.0. This threat targets everyday smart devices, turning them into tools for cybercrime without users even realizing it. How Are Devices Being Compromised? Cybercriminals are exploiting vulnerabilities in common Internet of […]
You are browsing archives for
Category: Malware Threats
We provide you the important tech, cyber news, and important cyber events. Cyber-security threats and vulnerabilities are threats.
Imposter Microsoft Websites, Pig Butchering Scams, and extorting money
Imposter Microsoft websites and pig butchering scams continue to be on the rise. These criminals’ goal is to either have you click or call them with the ultimate goal of extorting money from you. Do not fall for these and don’t be the victim. Normally, these pop-ups will take up the entire screen and began […]
Common Scam Types
Common Scam Types will prepare you and heighten your awareness of these types of scams. Payment Scams Exercise caution if you encounter situations where you’re pressured to make a purchase in exchange for compensation, or if someone offers to handle a payment on your behalf or provides bank account details for payment purposes. If an […]
Shipment-Delivery Scams spreading Malware
Threat actors are increasingly using scams that spoof package couriers like DHL or the U.S. Postal Service in authentic-looking phishing emails which attempt to dupe victims into downloading credential-stealing or other malicious payloads. The emails used to deliver Trickbot include official USPS branding as well as details such as third-party social-media logos from Facebook, Instagram, […]
FBI, CISA Warn US Firms of State-Mandated Tax Malware
Organizations doing business in China have been warned that official looking software mandated for download by domestic banks may actually contain backdoor malware.
Social Engineering Alert
Cybercriminals are mailing USB devices to unsuspecting companies. These malicious USB devices include teddy bears or gift cards. After the USB device is plugged in, the malicious USB device automatically infects the computer. Do not plug in any unknown USB devices to any computer system. If you do receive a package, the contact us immediately.
17 Apple Apps infected with clicker Trojan malware
The clicker Trojan module discovered in this group of applications is designed to carry out ad fraud-related tasks in the background, such as continuously opening web pages or clicking links without any user interaction. Malware Objective The objective of most clicker trojans is to generate revenue for the attacker on a pay-per-click basis by inflating […]