This is weird:

Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute. So far, however, researchers have yet to observe delivery of any payload on any of the infected 30,000 machines, leaving the malware’s ultimate goal unknown. The lack of a final payload suggests that the malware may spring into action once an unknown condition is met.

Also curious, the malware comes with a mechanism to completely remove itself, a capability that’s typically reserved for high-stealth operations. So far, though, there are no signs the self-destruct feature has been used, raising the question of why the mechanism exists…

Read More Mysterious Macintosh Malware

JFC International, a major wholesaler and distributor of Asian food products in the United States, was hit by ransomware. JFC International, a major distributor and wholesaler of Asian food products, announced it has recently suffered a ransomware attack. The ransomware attack only impacted JFC International’s Europe Group, the malware caused the disruption of some of its IT […]

The post Distributor of Asian food JFC International hit by Ransomware appeared first on Security Affairs.

Read More Distributor of Asian food JFC International hit by Ransomware

Also known as SIM splitting, simjacking, SIM hijacking, and port-out scamming, SIM swapping is a type of fraud that targets your personal information so that cybercriminals can pass themselves off as you and access your bank accounts. In short, the fra…

Read More What is SIM Swapping?

The Javascript-based infection framework for the Gootkit RAT was enhanced to deliver a wider variety of malware, including ransomware. Experts from Sophos documented the evolution of the “Gootloader,” the framework used for delivering the Gootkit RAT banking Trojan. The framework was improved to deploy a wider range of malware, including ransomware payloads. “In recent years, almost […]

The post Gootkit delivery platform Gootloader used to deliver additional payloads appeared first on Security Affairs.

Read More Gootkit delivery platform Gootloader used to deliver additional payloads

We have moved from Industry 4.0 (inspired by WEF–World Economic Forum), Society 5.0 (Japan G20), Smart Humanity (KNVI, Royal Dutch IT Association) where digital transformation infuses all aspects of our lives–to the 5th Machine Age. AI is a key drive…

Read More Supercluster cements global leadership in 5th Machine Age with ground-breaking protein production addressing global food insecurity

Top executives of the software firm SolarWinds blamed an intern for having used a weak password for several years, exposing the company to hack. Top executives of the SolarWinds firm believe that the root cause of the recently disclosed supply chain attack is an intern that has used a weak password for several years. Initial […]

The post Intern caused ‘solarwinds123’ password leak, former SolarWinds CEO says appeared first on Security Affairs.

Read More Intern caused ‘solarwinds123’ password leak, former SolarWinds CEO says

Introduction The trojan is a sneaky impersonator that behaves like a legitimate program. It can hide in the background and steal information from the device. Trojan samples often delete, modify, block, and copy data to disrupt services provided by the …

Read More Understanding Android Malware Families (UAMF) – The Trojan: An impersonator in the background (Article 2)

Today’s podcast describes ways to avoid being victimized by fraud, and more
The post Cyber Security Today – Fraud Prevention Month starts, cyber incident costs hospital chain $67 million and problems with COVID apps first appeared on IT World Canada.

Read More Cyber Security Today – Fraud Prevention Month starts, cyber incident costs hospital chain $67 million and problems with COVID apps

Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company called SolarWinds. The hack gave the attackers access to the computer networks of some 18,000 of SolarWinds’s customers, including US government agencies such as the Homeland Security Department and State Department, American nuclear research labs, government contractors, IT companies and nongovernmental agencies around the world.

It was a huge attack, with major implications for US national security. The Senate Intelligence Committee is scheduled to …

Read More National Security Risks of Late-Stage Capitalism

There’s a lot of chatter about France’s new repairability index, a story about a surgeon’s Zoom call in the middle of surgery turns heads, and the comments of SolarWinds’ CEO It’s all the tech news that’s popular right now. Welcome to Hashtag Tre…

Read More Hashtag Trending, March 1, 2021 – France’s new ‘repairability’ index; Zoom call during surgery; More tips to fight Zoom fatigue

ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users for illegal data collection. ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users. The settlement has yet to be approved by a federal judge. The Chinese firm was accused to have failed […]

The post ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection appeared first on Security Affairs.

Read More ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection

The National Security Agency (NSA) published a document to explain the advantages of implementing a zero-trust model. The National Security Agency (NSA) recently published a document to explain the benefits of adopting a zero-trust model, and advice to navigate the process. Modern infrastructure are complex environments that combine multiple technologies and that are exposed to […]

The post NSA embraces the Zero Trust Security Model appeared first on Security Affairs.

Read More NSA embraces the Zero Trust Security Model