article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 73
article thumbnail

GoDaddy Reports Multi-Year Breach of Its Servers and Malware Campaign

SecureWorld News

Web hosting provider GoDaddy has revealed it suffered a security breach that lasted for several years, resulting in the installation of malware on its servers and the theft of source code related to some of its services. The company has attributed the campaign to a "sophisticated and organized group targeting hosting services."

Malware 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Government Agencies Discover New Chinese Malware Strain

SecureWorld News

CISA reports on Chinese malware strain. And it's a malware strain used specifically by the Chinese government. A recent CISA Malware Analysis Report (with contributions from the FBI and DoD), outlines this new malware variant. How should you defend yourself or your organization about this new malware variant?

Malware 53
article thumbnail

Over 100,000 ChatGPT Accounts Compromised by Cybercriminals

SecureWorld News

Cybersecurity firm Group-IB recently uncovered a significant security breach involving ChatGPT accounts. However, Group-IB says the default configuration of ChatGPT retains the history of user queries and AI responses, making unauthorized access to these accounts potentially disastrous.

Groups 116
article thumbnail

FBI: Corporate Milestones Targeted by Ransomware Groups

SecureWorld News

Install and regularly update anti-virus or anti-malware software on all hosts.". Use two-factor authentication for user login credentials, use authenticator apps rather than email as actors may be in control of victim email accounts and do not click on unsolicited attachments or links in emails.".

Groups 73
article thumbnail

Stop Malware Attacks and Online Identity Theft

Galido

Malware means a malicious or intrusive software application that is coded for executing on the targeted device without notifying its user or the owner. Affecting a mobile phone, a computer, a laptop, or a network server, malware interrupts computing operations, hijacks networks, or access systems. Update your browser.

Malware 68
article thumbnail

Don’t gamble with your identity verification practices

CIO Business Intelligence

I also emphasized that companies need to urgently review their employee access protocol, writing that companies must “ make it a point to do continuous employee training to help your teams avoid being duped by phishing and malware tactics.” Caesars and MGM were held to cash ransom demands in exchange for not releasing the data into the wild.