Anubis Ransomware Emerges With a Destructive Twist

Anubis Ransomware Emerges With a Destructive Twist

Dual Threat: Scrambling and Erasing Data A newly observed strain of ransomware called Anubis has attracted the attention of security researchers for its ability not only to lock files but also to wipe them out completely. According to a recent study by Trend Micro, the malware carries a “wipe…


0 Comments6 Minutes

Google Cloud Disruptions Affect Major Online Services

Google Cloud Disruptions Affect Major Online Services

Several Companies Report Issues as Google Scrambles to Restore Cloud Platform Google Cloud faced major technical problems on Thursday, causing widespread outages that affected businesses and online services around the world. The issues began late in the morning Pacific Time and continued for…


0 Comments6 Minutes

Adobe Fixes Over 250 Security Bugs in Major Software Update

Adobe Fixes Over 250 Security Bugs in Major Software Update

Most Issues Found in Adobe Experience Manager, Users Urged to Update Immediately Adobe has released a major round of security patches this week, fixing a total of 254 different vulnerabilities in several of its popular software products. The company said the majority of these flaws—225 in…


0 Comments5 Minutes

Fake Resumes on LinkedIn Deliver More_eggs Malware

Fake Resumes on LinkedIn Deliver More_eggs Malware

Posing as Job Seekers on Professional Platforms A criminal gang that security researchers know as FIN6 has begun taking advantage of the job-hunting world in a new way. According to a fresh investigation from DomainTools, the group is approaching recruiters on popular employment sites such as…


0 Comments6 Minutes

Google Confirms 6 in 10 Gmail Users Targeted by Email Scams

Google Confirms 6 in 10 Gmail Users Targeted by Email Scams

Why This Matters Google’s own survey shows that 61 % of people say they’ve been hit with email-based scams in the past year, and the majority of those attacks aimed straight at Gmail inboxes. At the same time, Google warns that “most users still rely on outdated log-ins like passwords and SMS 2FA,”…


0 Comments3 Minutes

Voice-Phishing Crew Poses as IT Staff to Raid Salesforce Data

Voice-Phishing Crew Poses as IT Staff to Raid Salesforce Data

Google Spots a New Wave of Social Engineering Google’s threat-intelligence analysts have warned that a profit-driven hacking crew—tagged UNC6040—has been dialing company employees, pretending to be help-desk staff, and talking its way into corporate Salesforce accounts. According to a report shared…


0 Comments6 Minutes

Chrome Add-Ons Leak Private Data in Their Code

Chrome Add-Ons Leak Private Data in Their Code

Plain-Text Web Requests Leave Users Exposed When Symantec researcher Yuanjing Guo took a closer look at a handful of high-profile Google Chrome extensions, he discovered a surprisingly simple flaw: many of them still reach out to the internet over old-fashioned HTTP instead of secure HTTPS. That…


0 Comments7 Minutes

Legitimate Remote Access Tool NetBird Abused in Sophisticated Phishing Wave

Legitimate Remote Access Tool NetBird Abused in Sophisticated Phishing Wave

Fake Job Pitch Opens the Door Cyber-criminals have launched a fresh spear-phishing operation that zeroes in on chief financial officers and senior money managers at banks, insurers, power companies, and investment houses across Europe, Africa, Canada, the Middle East, and South Asia. The scheme…


0 Comments7 Minutes

Fake AI Installers Spread Ransomware and Data-Wiping Malware

Fake AI Installers Spread Ransomware and Data-Wiping Malware

Bogus apps hide CyberLock and Lucky_Gh0$t ransomware A wave of counterfeit Fake AI Installers that pretend to be popular artificial-intelligence tools is making the rounds online, and security researchers warn that they are carrying far more than productivity promises. Analysts at Cisco…


0 Comments7 Minutes

Fortinet Spots Windows Trojan That hides on File Headers

Fortinet Spots Windows Trojan That hides on File Headers

Damaged Headers Help Malware Slip Past Defenses Fortinet’s incident-response specialists have come across a Windows program that bends the rules of how executable files are supposed to look, and that twist lets it avoid quick detection. Instead of carrying normal Disk Operating System (DOS) and…


0 Comments5 Minutes

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Privacy Preference Center