A clever new infostealer malware is able to easily bypass Google Chrome cookie encryption

A clever new infostealer malware is able to easily bypass Google Chrome cookie encryption

Researchers discover Glove Stealer, a new infostealer It can bypass Google’s cookie encryption mechanism, introduced last summer Glove Stealer can grab cookies, passwords, and information from add-ons and extensions Another infostealer able to… Article Source https://www.techradar.com/pro/security/a-clever-new-infostealer-malware-is-able-to-easily-bypass-google-chrome-cookie-encryption

Uncovering Ransomware and Infostealer Trends Through Analysis of Malicious Domain Data

Uncovering Ransomware and Infostealer Trends Through Analysis of Malicious Domain Data

In a recent discussion, cybersecurity experts highlighted the importance of monitoring DNS traffic to identify malicious activity within a network. By analyzing data and correlating it with information from news articles, social media, and cybersecurity researchers, professionals can detect patterns that may indicate potential threats. One key example cited was the correlation between spikes in … Read more

Google ads used to serve Mac users with info-stealer malware

Google ads used to serve Mac users with info-stealer malware

A recent discovery by security firm Malwarebytes has revealed that fake ads circulating through Google Ads are promoting Mac malware designed to steal sensitive data from unsuspecting Internet users. The malicious ads are promoting a fake version of Arc, a browser that promises a clutter-free and personal browsing experience. The ads redirect users to a … Read more

Vidar infostealer propagated through malicious Cisco Webex app

Vidar infostealer propagated through malicious Cisco Webex app

Intrusions have recently been identified involving trojanized versions of the Cisco Webex Meetings application distributed as fake or cracked copies of the software, aiming to deploy the Vidar Stealer Malware. The malicious activity begins with the extraction and running of a “Setup.exe” file in password-protected archives housing the infected application. This action triggers the loading … Read more