malware

Trend Micro’s Investigation Into GitHub Codespaces Reveals Malware Vulnerability

Trend Micro’s Investigation into GitHub Codespaces Reveals Malware Vulnerability

Trend Micro researchers have revealed how the port-forwarding feature within GitHub Codespaces is a vulnerability which cybercriminals could abuse to deliver and host malware. The researchers found that threat actors could abuse the public sharing of forward ports to create a malware server. All cybercriminals need to do to avoid detection and suspicion is use a legitimate GitHub account. As of yet, the security vulnerability hasn’t been exploited in the wild.

Zoom Phishing Site Delivers IcedID Malware, Poses Threat to User Banking Credentials

Zoom Phishing Site Delivers IcedID Malware, Poses Threat to User Banking Credentials

The Zoom video conferencing application has been modified to deliver the IcedID malware to victims, according to a report issued by Cyble Research and Intelligence Labs (CRIL). IcedID, or “BokBot,” is designed to steal user banking credentials, primarily targeting businesses. Though IcedID serves mainly as a loader for other malware strains, it’s a lethal malware capable of avoiding detection from scanners.

PowerShell - How to Keep Someone from Using It against You

PowerShell – How to Keep Someone from Using It against You

Cybercriminals are increasingly turning toward using PowerShell as an attack tool because it’s powerful and tightly integrated into the Windows operating system. Although disabling PowerShell probably isn’t an option, you have some things that you can do to reduce the chances of a cybercriminal using it against you.

Why You Should Implement Allowlisting to Boost Your Cybersecurity

Why You Should Implement Allowlisting to Boost Your Cybersecurity

Allowlisting is critical to your company’s cybersecurity because it helps you prevent many issues. Allowlists only give access to pre-approved individuals, so that stops intruders. You can allowlist IP and email addresses and applications. Combine allowlisting with blocklisting and other tools to boost your cybersecurity suite.

Scroll to Top