Hackers often target remote assist tools because they create a direct channel to access desired systems with minimum effort.
Category: Cyber Crime
Crooks plant backdoor in software used by courtrooms around the world | Ars Technica
A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack
Skimmer found on self-checkout register inside Wawa
A credit card skimmer was found inside a Wawa gas station in Baltimore County.
Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech | WIRED
For at least a decade, a car theft trick known as a “relay attack” has been the modern equivalent of hot-wiring: a cheap and relatively easy technique to steal hundreds of models of vehicles.
Phishing statistics that will make you think twice before clicking – Help Net Security
This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape.
YouTube Becomes Latest Battlefront for Phishing, Deepfakes
YouTube has turned into a new front for malicious actors to deploy phishing, other malware, and bogus investment schemes, according to a report from researchers at security vendor Avast.
Rise of zero-day exploits reshape security recommendations | CSO Online
With zero-day attacks rapidly eclipsing exploits of known flaws, CISOs face the specter of having to switch up their security strategies in favor of post-exploitation response.
Ascension hospitals’ ransomware hack affecting patient care
Nearly two weeks since the May 8 ransomware attack that took down the computer network across the nation’s biggest Catholic health system, employees at Ascension’s Michigan hospitals told the Free Press they don’t know when all of its tech systems will be restored.
Researchers spot cryptojacking attack that disables endpoint protections | Ars Technica
Malware recently spotted in the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.