Written By David Bisson

Attackers Compromise Admin Account to Infect Manufacturing Company With BitPaymer Ransomware

Threat actors compromised an account with administrator privileges to infect a manufacturing company with BitPaymer ransomware.

Emotet Variants Hijack Existing Email Conversations to Distribute Malicious Links

Researchers observed variants of the Emotet Trojan injecting themselves into existing email conversations as a means of distributing malicious links.

Sextortion Scammers Enhance Attack Campaigns With Image Spam, Other New Techniques

Security researchers observed sextortion scammers launching new attack campaigns that leverage image spam and other clever techniques to trick users into fulfilling their demands.

Phishing Campaign Makes Use of SingleFile Browser Extension Tool to Obfuscate Malicious Activity

In a recent phishing campaign, fraudsters used a legitimate browser extension tool called SingleFile to obfuscate their attacks and remain undetected.

Web Servers Used to Host 10 Malware Families Distributed via Phishing Emails

Digital attackers used more than a dozen web servers to host 10 malware families and distributed those threats using phishing emails.

Fraudsters Seize on March Madness Fervor With Phishing Attacks, Streaming Scams

Online fraudsters are exploiting users' excitement for March Madness by targeting them with phishing attacks and streaming scams.

New XLoader Variant Masquerades as Android Security Apps, iOS Configuration Profile

Security researchers observed a new variant of XLoader masquerading as Android security apps and an iOS configuration profile to target mobile users.

New Gustuff Android Trojan Capable of Targeting More Than 100 Banking Apps

Researchers detected a new Android Trojan called Gustuff that is capable of targeting more than 100 mobile banking apps.

Unnam3d Ransomware Moves Files Into Protected RAR Archives, Demands Amazon Gift Card

Security researchers discovered a new ransomware family called Unnam3d that moves targeted files into protected RAR archives and demands an Amazon gift card as ransom.

Data Leak Involving Family Tracking App Exposed 238,000 Users’ Real-Time Locations for Weeks

A data leak involving a family tracking app exposed the real-time locations of more than 238,000 users for weeks as a result of a database misconfiguration.