Remove Libraries Remove Mining Remove Phishing Remove Ransomware
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

Since the beginning of the year, security firms observed a new intense ransomware campaign spreading the Shade ransomware. Between January and February, a new, intense, ransomware campaign has been observed by many security firms. Trend of malicious JavaScript downloading Shade ransomware (source: ESET).

article thumbnail

Weekly podcast: Browsealoud cryptojacking, Bee Token phishing and Olympic attacks

IT Governance

This week, we discuss the use of cryptocurrency mining software on numerous government websites, a phishing scam that robbed Bee Token investors of $1 million and cyber attacks on the Pyeongchang Winter Olympics. Here are this week’s stories. and NHS sites in the UK.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 228

Security Affairs

At least 23 Texas local governments targeted by coordinated ransomware attacks. 5 Common Phishing Attacks and How to Avoid Them? A backdoor mechanism found in tens of Ruby libraries. Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency. 5 Ways to Protect Yourself from IP Address Hacking.

article thumbnail

List of Data Breaches and Cyber Attacks in September 2022 – 35.6 Million Records Breached

IT Governance

Ransomware. Ransomware. Costa Rica’s Junta De Proteccion Social hit by ransomware (unknown) Former students and staff at Savannah College of Art and Design affected by security incident (unknown) Ransomware attack takes down L.A. Cyber attacks. Data breaches. Malicious insiders and miscellaneous incidents. Cyber attacks.

article thumbnail

EP 49: LoL

ForAllSecure

Kyle Hanslovan CEO of Huntress Labs joins The Hacker Mind to discuss recent LoL attacks, specifically the Microsoft Follina attack and the Kaseya ransomware attack, and how important it is for small and medium sized businesses to start using enterprise grade security, given the evolving nature of these attacks. I'm Robert Vamosi.