article thumbnail

macOS Devices Targeted by Infostealer Malware

IT Toolbox

A cybersecurity report disclosed information-stealing campaigns against macOS users. The post macOS Devices Targeted by Infostealer Malware appeared first on Spiceworks. Learn more about the implications of the attacks and the strategies used by threat actors to steal the credentials of their victims.

Malware 278
article thumbnail

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Tech Republic Security

ESET's latest report highlights the abuse of the ChatGPT name, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware.

Malware 192
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware

Tech Republic Security

Microsoft OneDrive accounts for 26% of the overall usage of cloud storage apps to host malware, ahead of Microsoft PowerPoint and GitHub.

Malware 193
article thumbnail

Almost half of mobile malware are hidden apps

Tech Republic Security

Cybercriminals are finding new ways to get malware on mobile devices, including abusing Android's accessibility features, according to a McAfee report.

Malware 212
article thumbnail

State of malware: 3 key findings in the latest Malwarebytes report

Tech Republic Security

Spyware activity spiked in 2020, and the malware-as-a-service business model got more sophisticated.

Malware 190
article thumbnail

IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries

Tech Republic Security

Find out how Grandoreiro banking trojan campaigns work and the countries targeted, as well as how to mitigate this malware threat.

Malware 174
article thumbnail

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Background: - The point of this report is to support evidence-based risk management. For more see: Data Breach Investigations Report (DBIR). Automate with them.

Report 310