Many macOS users believe their operating system is immune to malware, so they don’t need to take extra security precautions. In reality, it’s far from the truth, and new threats keep popping up. Are there viruses for macOS? Yes — and plenty of ’em. Here are some examples of Mac malware we’ve previously covered on Kaspersky Daily and Securelist: A crypto-wallet-stealing Trojan … [Read more...] about How the Banshee stealer infects macOS users
Top Threat Tactics and How to Address Them
Each quarter, Cisco Talos Incident Response publishes a summarized record of the notable trends from the cases they work. The attacks, techniques, and methodology that Talos observes helps to shape and inform many of the protections that Cisco’s customers use on a regular basis. Part of their work in this area helps promote Talos’ principle of see once, block … [Read more...] about Top Threat Tactics and How to Address Them
Over 57 Nation-State Threat Groups Using AI for Cyber Operations
Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious cyber and information operations. "Threat actors are experimenting with Gemini to enable their operations, finding productivity gains but not yet developing novel capabilities," … [Read more...] about Over 57 Nation-State Threat Groups Using AI for Cyber Operations
The Evolving Role of AI in Data Protection
Each year, Data Protection Day marks an opportunity to assess the state of privacy and security in the midst of technological innovation. This year’s inflection point follows a robust dialogue on AI from last week’s World Economic Forum Annual Meeting in Davos. As CrowdStrike participated in these discussions, we emphasized the importance of leveraging AI to defend against … [Read more...] about The Evolving Role of AI in Data Protection
Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks
Jan 29, 2025Ravie LakshmananThreat Intelligence / Malware The North Korean threat actor known as the Lazarus Group has been observed leveraging a "web-based administrative platform" to oversee its command-and-control (C2) infrastructure, giving the adversary the ability to centrally supervise all aspects of their campaigns. "Each C2 server hosted a web-based administrative … [Read more...] about Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks
What scareware is and how to protect yourself
Imagine: you’re calmly working away on your computer, when suddenly a scary message appears on the screen: “Your computer is infected with viruses! Install an antivirus immediately!” or “Your data is at risk! Clean your system immediately!” Panic? That’s what the scammers are hoping for. This post explains what scareware is and why this threat is dangerous. We also give tips … [Read more...] about What scareware is and how to protect yourself
CrowdStrike Extends Powerful Falcon Platform Capabilities into Red Hat OpenShift
Kubernetes has become the cornerstone of modern DevOps, empowering teams to quickly deploy, manage, and scale containerized applications. However, many struggle to navigate Kubernetes' complexity while operating across hybrid and multi-cloud environments. Red Hat OpenShift builds on Kubernetes by providing a consistent, enterprise-grade platform that abstracts the … [Read more...] about CrowdStrike Extends Powerful Falcon Platform Capabilities into Red Hat OpenShift
CrowdStrike Falcon Earns Perfect Score in SE Labs’ Ransomware Evaluation
In the 2024 SE Labs Enterprise Advanced Security (EDR) Ransomware Test, the CrowdStrike Falcon platform achieved a perfect score of 100% in detection, protection, and accuracy, earning the prestigious AAA Award for Advanced Security EDR Protection for the third time in a row. The Falcon platform detected and blocked 100% of ransomware files and protected endpoints across … [Read more...] about CrowdStrike Falcon Earns Perfect Score in SE Labs’ Ransomware Evaluation
PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks
Jan 28, 2025Ravie LakshmananPhishing Attack / Network Security A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously … [Read more...] about PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks
GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs
Jan 27, 2025Ravie LakshmananVulnerability / Software Security Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user's Git credentials. "Git implements a protocol called Git Credential Protocol to retrieve credentials from the … [Read more...] about GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs