An ongoing malvertising campaign is targeting IT administrators looking to download system utilities such as PuTTY (a free SSH and Telnet client) and FileZilla (a free cross-platform FTP application). “We have reported this campaign to Google but no action has been taken yet,” , Malwarebytes researcher Jérôme Segura shared. The campaign Malicious ads served via […]
Carlina Teteris/Getty Images Android users in Singapore will not be able to download apps deemed to be unsafe, as Google looks to roll out fraud protection measures in collaboration with the local government. The move aims to combat a growing scam problem in the country, the first to trial the feature. Also: Singapore hit by […]
Last updated 5 December, 2023 Users of Denon DJ and Numark’s standalone equipment can now download Engine DJ 3.3, the latest version of the embedded software for their DJ gear that brings a whole host of new features. As well as profiles allowing a single login for all services and enabling cloud BPM and key […]
A targeted campaign against the gaming community exploits Discord channels and fake download sites to distribute types of information-stealing malware. Multiple information stealer families, including BBy Stealer, Nova Sentinel, Doenerium, and Epsilon Stealer, were identified. To counter similar threats, online gamers are urged to download software exclusively from official and trustworthy websites.
Sep 21, 2023THNSupply Chain / Malware The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back to 2020 that led to its website being used to distribute malicious Linux software. “It appears that a specific web page on our site was compromised by a Ukrainian hacker group, exploiting it to distribute […]
Sep 14, 2023THNSupply Chain / Malware A download manager site served Linux users malware that stealthily stole passwords and other sensitive information for more than three years as part of a supply chain attack. The modus operandi entailed establishing a reverse shell to an actor-controlled server and installing a Bash stealer on the compromised system. […]