Remove Applications Remove Authentication Remove Malware Remove Research
article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

A new study from Uptycs has uncovered an increase in the distribution of information stealing malware. Newly discovered stealer families include modules that specifically steal logs from MFA applications, like the Rhadamanthys malware. This demonstrates a focus on collecting data from multi-factor authentication tools.

Malware 69
article thumbnail

Research Uncovers 3,200+ Mobile Apps Leaking Twitter API Keys

SecureWorld News

New research from security firm CloudSEK shows that more than 3,200 mobile applications were leaking Twitter API (Application Program Interface) keys, which can be used to gain access and take over user accounts. Researchers learned that 3,207 apps were leaking valid Consumer Key and Consumer Secret information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Report: Attackers Move Lightning Fast to Capitalize on  Vulnerabilities

SecureWorld News

This morning, the Qualys Threat Research Unit released its 2023 Threat Landscape Year in Review report. In 2023, the Qualys Threat Research Unit (TRU) witnessed a critical trend in exploiting high-risk vulnerabilities. One-third of high-risk vulnerabilities impacted network devices and web applications.

Report 82
article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO Business Intelligence

Weak authentication and authorization: One of the foremost vulnerabilities in IoT deployments stems from inadequate authentication and authorization practices. In fact, two notorious botnets, Mirai and Gafgyt, are major contributors to a recent surge in IoT malware attacks. of the total number of attempted IoT malware attacks.

article thumbnail

New Alert: Russian Hackers Are Targeting COVID-19 Research

SecureWorld News

CISA advisory: who is targeting COVID-19 research? Cyberattacks on COVID-19 research are starting to feel as common as COVID-19. In fact, CISA has already published a general joint advisory on nation-state hackers targeting pandemic research. WELLMESS : This file is a malicious compiled.NET application.

article thumbnail

Technology Short Take 176

Scott Lowe

The Sysdig Threat Research Team uncovered the malicious use of a network mapping tool called SSH-Snake. Think Linux doesn’t have malware? And here’s another example of malware that is targeting Linux (along with Windows). Rory McCune explains Kubernetes authentication. Read more about it in this post.

Linux 107
article thumbnail

Modern Network Security: How Technology and Smart Practices are Reducing Risk

CIO Business Intelligence

With the shift to hybrid work, data, applications, intellectual property, and personal information is no longer stashed safely behind a corporate firewall. In this webcast, we’ll explore: The current trending threats facing networks, like authentication vulnerabilities, malware, phishing, and denial of service attacks.

Network 90