abused

6 Articles
Zoom remote control feature abused for crypto stealing cyberattacks
Tech

Zoom remote control feature abused for crypto stealing cyberattacks

Cybercriminals are inviting victims to talk to “journalists” On the Zoom call, they’re asked to grant permissions for remote access Those that grant...

Google system abused by hackers to hijack ecommerce stores
Tech

Google system abused by hackers to hijack ecommerce stores

Sucuri finds credit card skimmer in Magento-powered ecommerce site The skimmer was hiding within Google Tag Manager At least six websites were compromised,...

Microsoft Teams abused in Russian email bombing ransomware campaign
Tech

Microsoft Teams abused in Russian email bombing ransomware campaign

Sophos’ researchers said they saw two groups engaging in email bombing attacks At least 15 organizations were targeted in the last three months...

Microsoft Teams and AnyDesk abused to deploy dangerous malware, so be on your guard
Tech

Microsoft Teams and AnyDesk abused to deploy dangerous malware, so be on your guard

Criminals are reaching out to victims, offering to help with a “problem” To fix the issue, they request AnyDesk access If they get...

Cloudflare developer domains increasingly abused by threat actors
Tech

Cloudflare developer domains increasingly abused by threat actors

Security pros from Fortra spot new phishing campaign abusing two Cloudflare domains Pages, and Workers, are being used to bypass email protections and...

Even official company documents can be abused to try and spread malware
Tech

Even official company documents can be abused to try and spread malware

React Native documentation for Fabric Native Components includes a detailed guide with specific commands One command was flawed, potentially resulting in malware deployment...