New USPS text scam uses unique method to hide malicious PDF links – Go Health Pro

New USPS text scam uses unique method to hide malicious PDF links – Go Health Pro

A new phishing scam targeting mobile devices was observed using a “never-before-seen” obfuscation method to hide links to spoofed United States Postal Service (USPS) pages inside PDF files, Zimperium reported Monday. The method manipulates elements of the Portable Document Format (PDF) to make clickable URLs appear invisible to both the user and mobile security systems, … Read more

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools – Go Health Pro

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools – Go Health Pro

Dec 19, 2024Ravie LakshmananSupply Chain / Software Security Threat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry. The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and retrieve second-stage payloads, respectively. “While … Read more

Malware delivered via malicious QR codes sent in the post – Go Health Pro

Malware delivered via malicious QR codes sent in the post – Go Health Pro

Cybercriminals have adopted a novel trick for infecting devices with malware: sending out physical letters that contain malicious QR codes. Switzerland’s National Cyber Security Centre (NCSC) has issued a warning to the public about letters sent through the post that pretend to come from the Swiss Federal Office of Meteorology and Climatology (MeteoSwiss) that encourage … Read more

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation – Go Health Pro

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation – Go Health Pro

Oct 10, 2024Ravie LakshmananCybercrime / Disinformation OpenAI on Wednesday said it has disrupted more than 20 operations and deceptive networks across the world that attempted to use its platform for malicious purposes since the start of the year. This activity encompassed debugging malware, writing articles for websites, generating biographies for social media accounts, and creating … Read more

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet – Go Health Pro

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet – Go Health Pro

Cybersecurity researchers have uncovered a new cryptojacking campaign targeting the Docker Engine API with the goal of co-opting the instances to join a malicious Docker Swarm controlled by the threat actor. This enabled the attackers to “use Docker Swarm’s orchestration features for command-and-control (C2) purposes,” Datadog researchers Matt Muir and Andy Giron said in an … Read more

x