Sharp-Project: New Stealer Family on the Market
G Data Security
by
2d ago
Infostealers are one of the most lucrative types of malware employed by criminals. And because this is a tried and tested approach, there are still new players entering this illegal game. The new kid on the block is called "Sharp Stealer", and one of its favourite targets are gamers.       ..read more
Visit website
Android: Banking trojan masquerading as Chrome
G Data Security
by
1w ago
Many people make banking transactions online now. And since mobile devices are one of the most popular and convenient ways to shop and make payments, criminals are naturally drawn to this. A current example of a malware that specifically targets online banking shows how easy it is to fall for malware.       ..read more
Visit website
RisePro stealer targets Github users in “gitgub” campaign
G Data Security
by
1M ago
RisePro resurfaces with new string encryption and a bloated MSI installer that crashes reversing tools like IDA. The "gitgub" campaign already sent more than 700 archives of stolen data to Telegram.       ..read more
Visit website
Let the "Mother of all Breaches" Be a Wake-up Call
G Data Security
by
1M ago
At the end of January, a database with an allegedly unprecedented amount of personal information of billions of people appeared online. What does that mean for every one of us? What are the ramifications? Or is it all “more bark than bite”?       ..read more
Visit website
My 6 Security Predictions for 2024…
G Data Security
by
3M ago
The beginning of January is traditionally the perfect month to look ahead to the new year. What can we expect in 2024 in the field of security? I present six predictions for this year.       ..read more
Visit website
Csharp-streamer: Peeking under the hood
G Data Security
by
5M ago
An unusual attack tool has caught the attention and peaked the curiosity of G DATA analyst Hendrik Eckardt. The discovered RAT (Remote Access Tool) is apparently designed for networks where people take an annoyingly close - for the attackers - look at what is happening.       ..read more
Visit website
Cobalt Strike: Looking for the Beacon
G Data Security
by
5M ago
During an incident response, looking for malware is often akin to looking for a needle in a hay stack. To complicate matters further, in the case of Cobalt Strike you often have no idea what that needle even looks like. And time is not on your side.       ..read more
Visit website
New "Agent Tesla" Variant: Unusual "ZPAQ" Archive Format Delivers Malware
G Data Security
by
5M ago
A new variant of Agent Tesla uses the uncommon compression format ZPAQ to steal information from approximately 40 web browsers and various email clients. But what exactly is this file compression format? What advantage does it provide to threat actors? And why it is assumed that the version of Agent Tesla is “new”?       ..read more
Visit website
Hostile Takeover: Malicious Ads via Facebook
G Data Security
by
6M ago
Criminals hijack business accounts on Facebook and run their own advertising campaigns in someone else's name and at the expense of those affected. This quickly results in thousands of euros in damages for the actual account holders - not to mention the damage to their reputation.       ..read more
Visit website
Robots: Cybercriminals of the Future?
G Data Security
by
7M ago
Artificial intelligence and adjacent technologies have been causing quite the stir lately. Many are concerned that AI is going to give rise to new and potentially completely machine-generated forms of criminal attacks. Let us look at some of those concerns.       ..read more
Visit website

Follow G Data Security on FeedSpot

Continue with Google
Continue with Apple
OR