article thumbnail

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Tech Republic Security

ESET's latest report highlights the abuse of the ChatGPT name, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware.

Malware 170
article thumbnail

Lazarus APT Continues to Exploit Log4j Vulnerability

SecureWorld News

Despite widespread awareness and patches issued by software developers, the vulnerability's exploitation remains a persistent threat. As part of Operation Blacksmith, Lazarus has introduced three previously unseen malware families written in the DLang programming language.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Over 100,000 ChatGPT Accounts Compromised by Cybercriminals

SecureWorld News

Since its creation, ChatGPT has gained rapid popularity among employees for optimizing various aspects of their work, including software development and business communications. Info stealers are a type of malware that specializes in collecting various credentials and personal information from infected computers.

Groups 116
article thumbnail

After ‘protestware’ attacks, a Russian bank has advised clients to stop updating software

The Verge

As the Russian invasion of Ukraine draws on, consequences are being felt by many parts of the technology sector, including open-source software development. In addition, various content and malicious code can be embedded in freely distributed libraries used for software development.

Banking 98
article thumbnail

PrintListener proves a James Bond-like fingerprint hack actually exists

Dataconomy

PrintListener boasts an unnerving success rate in cracking partial fingerprints ( Image credit ) Cyberthreats are constantly evolving The PrintListener revelation underscores a broader trend in cybersecurity: There is a new sophisticated hacking method being developed day by day.

Malware 80
article thumbnail

Hygiene does not only protect you against physical viruses

Dataconomy

Think of it as regular habits you can develop to protect yourself in the digital realm, just like washing your hands regularly to ward off germs in the physical world. These devices may contain malware or be under surveillance, posing a risk to your sensitive information. Stick to trusted and secure devices whenever possible.

Malware 68
article thumbnail

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

They use the apps to gain access to the victim's computer and install malware across the network environment, stealing private keys and exploiting other security gaps. The messages often mimic a recruitment effort and offer high-paying jobs to entice the recipients to download malware-laced cryptocurrency applications, which the U.S.

Malware 73