Tag: malware

Tech Time Warp: Magistr “disembowels” computers
In early 2001, a nasty bug began making the rounds, hitting computer users hard with a particularly challenging payload as seen in this edition of Tech Time Warp. Magistr—sometimes called “Disemboweler” after the Swedish hacker group thought to be behind...

Five ways cybercriminals use AI to wreak havoc
It seems that each time there is a new technology advancement, criminals quickly cut to the front of the line when it comes to dreaming up new applications. That is the case with generative artificial intelligence (AI), which has been...

MSPs have an opportunity to change the cybersecurity game
For as long as anyone can remember, cybersecurity has been a game of whac-a-mole where resources are hopefully marshaled in time to thwart a threat either before damage is inflicted or, at the very least, as quickly as possible once...

Swifties can pose cyber risks
If you are like me, the whole Taylor Swift-Travis Kelce romance isn’t keeping you up at night. Taylor Swift can be an economic boom to cities where she tours, but she can also be an unintentional cyber risk to her legions...

Scattered Spider spins a troublesome web
The Itsy-Bitsy Spider may have crawled up the waterspout, but the Scattered Spider could be crawling into your email box. CISA is sounding the alarm about Scattered Spider and the havoc it can wreak. The CISA bulletin says: “Scattered Spider...

Cybersecurity Threat Advisory: ‘LittleDrifter’ extends its reach
This Cybersecurity Threat Advisory sheds light on a recently discovered USB worm identified as “LittleDrifter” has been attributed to the Russia-linked hacker group known as Gamaredon. The worm has spread beyond its presumed intended target, Ukraine, to other countries including...

Tech Time Warp: Origins of the term “computer virus”
Now, nearly four years since the word “coronavirus” entered the popular lexicon, who doesn’t feel like an amateur epidemiologist? Given world events, it should be easy to understand why Leonard Adleman—the “A” of the RSA algorithm—was inspired by the graduate...

Quishing: What you need to know about QR code email attacks
In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...

Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered
Today’s Cybersecurity Threat advisory discusses the update to the popular Bumblebee malware loader that increases its defense evasion capabilities. The loader is commonly distributed via “.lnk” (softlink/shortcut) files attached to an email or compressed in a .zip archive attached to...