article thumbnail

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Tech Republic Security

ESET's latest report highlights the abuse of the ChatGPT name, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware.

Malware 164
article thumbnail

After ‘protestware’ attacks, a Russian bank has advised clients to stop updating software

The Verge

As the Russian invasion of Ukraine draws on, consequences are being felt by many parts of the technology sector, including open-source software development. In addition, various content and malicious code can be embedded in freely distributed libraries used for software development.

Banking 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lazarus APT Continues to Exploit Log4j Vulnerability

SecureWorld News

Despite widespread awareness and patches issued by software developers, the vulnerability's exploitation remains a persistent threat. As part of Operation Blacksmith, Lazarus has introduced three previously unseen malware families written in the DLang programming language. Patrick Carey, Sr.

article thumbnail

Over 100,000 ChatGPT Accounts Compromised by Cybercriminals

SecureWorld News

Since its creation, ChatGPT has gained rapid popularity among employees for optimizing various aspects of their work, including software development and business communications. Info stealers are a type of malware that specializes in collecting various credentials and personal information from infected computers.

Groups 123
article thumbnail

Hygiene does not only protect you against physical viruses

Dataconomy

Neglecting cyber hygiene can make individuals and organizations more vulnerable to cyberattacks, such as malware infections, data breaches, and identity theft ( Image credit ) There is a cyber hygiene checklist you need to follow Cyber hygiene is not merely an option but a necessity in our digital age.

Malware 68
article thumbnail

5 challenges for securing the future

CIO Business Intelligence

The path toward future information security mastery includes: Acknowledging individual responsibilities/accountabilities, Making individual infosec beliefs explicit, Practicing good cyber hygiene, Paying attention to the software supply chain, and Hardening operational technology components. Spectators no more. Security, Security Practices

Security 130
article thumbnail

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

They use the apps to gain access to the victim's computer and install malware across the network environment, stealing private keys and exploiting other security gaps. The messages often mimic a recruitment effort and offer high-paying jobs to entice the recipients to download malware-laced cryptocurrency applications, which the U.S.

Malware 81