News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Cybersecurity Threats Surge: Billions of Malware Incidents Reported in 2024

The US has been hit with over 1.9 billion malware threats last year, according to research from NordVPN, highlighting the growing scale of the cybersecurity problem facing businesses and consumers alike. The most impersonated brands were Facebook, Google, and Microsoft, with almost 85,000 fake Google URLs identified, prompting users to click on malicious links or hand over sensitive information. Phishing remains a serious problem, with experts warning that users should be cautious when opening unexpected communications and verifying all downloads.

See Also

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.87

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

More Reports Claim 2024 Was the Worst Year for Ransomware Attacks Yet. Δ1.85

2024 has been marked as a record-breaking year for ransomware attacks, with a 65% increase in detected groups and 44 new malware variants contributing to almost a third of undisclosed attacks. The healthcare, government, and education sectors were disproportionately affected, while emerging groups like LockBit and RansomHub accounted for a significant number of incidents, highlighting the growing sophistication of cybercriminals. As organizations face escalating financial and reputational risks, the need for proactive cybersecurity measures has never been more urgent.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.85

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.84

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Web DDoS Attacks See Major Surge as AI Allows More Powerful Attacks Δ1.84

Layer 7 Web DDoS attacks have surged by 550% in 2024, driven by the increasing accessibility of AI tools that enable even novice hackers to launch complex campaigns. Financial institutions and transportation services reported an almost 400% increase in DDoS attack volume, with the EMEA region bearing the brunt of these incidents. The evolving threat landscape necessitates more dynamic defense strategies as organizations struggle to differentiate between legitimate and malicious traffic.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.82

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

Infostealer Malware Stole 493 Million Accounts: How Your Data May Have Been Compromised Δ1.81

Recently, news surfaced about stolen data containing billions of records, with 284 million unique email addresses affected. Infostealing software is behind a recent report about a massive data collection being sold on Telegram, with 23 billion entries containing 493 million unique pairs of email addresses and website domains. As summarized by Bleeping Computer, 284 million unique email addresses are affected overall.

BadBox Malware Hit After Infecting Over 500,000 Android Devices Δ1.80

Cybersecurity experts have successfully disrupted the BadBox 2.0 botnet, which had compromised over 500,000 low-cost Android devices by removing numerous malicious apps from the Play Store and sinkholing multiple communication domains. This malware, primarily affecting off-brand devices manufactured in mainland China, has been linked to various forms of cybercrime, including ad fraud and credential stuffing. Despite the disruption, the infected devices remain compromised, raising concerns about the broader implications for consumers using uncertified technology.

The Rise of Fake Spyware Apps in the Play Store Δ1.79

Google's security measures have been breached by fake spyware apps, which are hidden in plain sight on the Google Play Store. These malicious apps can cause immense damage to users' devices and personal data, including data theft, financial fraud, malware infections, ransomware attacks, and rootkit vulnerabilities. As a result, it is crucial for smartphone users to take precautions to spot these fake spyware apps and protect themselves from potential harm.

Malware Botnet Spreads Across 1.6 Million Android Tvs Δ1.78

The Vo1d botnet has infected over 1.6 million Android TVs, with its size fluctuating daily. The malware, designed as an anonymous proxy, redirects criminal traffic and blends it with legitimate consumer traffic. Researchers warn that Android TV users should check their installed apps, scan for suspicious activity, and perform a factory reset to clean up the device.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.78

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.78

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Businesses Are Worried About AI Use in Cyberattacks Δ1.78

Artificial Intelligence (AI) is increasingly used by cyberattackers, with 78% of IT executives fearing these threats, up 5% from 2024. However, businesses are not unprepared, as almost two-thirds of respondents said they are "adequately prepared" to defend against AI-powered threats. Despite this, a shortage of personnel and talent in the field is hindering efforts to keep up with the evolving threat landscape.

US Indictments of Chinese Hackers Raise Global Concerns About Cybersecurity Δ1.78

The U.S. government has indicted a slew of alleged Chinese hackers, sanctioned a Chinese tech company, and offered a $10 million bounty for information on a years-long spy campaign that targeted victims across America and around the world. The indictment accuses 10 people of collaborating to steal data from their targets, including the U.S. Defense Intelligence Agency, foreign ministries, news organizations, and religious groups. The alleged hacking scheme is believed to have generated significant revenue for Chinese intelligence agencies.

Tech Giant Google Discloses Scale of AI-Generated Terrorism Content Complaints Δ1.78

Google has informed Australian authorities it received more than 250 complaints globally over nearly a year that its artificial intelligence software was used to make deepfake terrorism material, highlighting the growing concern about AI-generated harm. The tech giant also reported dozens of user reports warning about its AI program Gemini being used to create child abuse material. The disclosures underscore the need for better guardrails around AI technology to prevent such misuse.

Protecting Yourself From Tax-Related Scams in 2025: 10 Expert Tips Δ1.78

Almost half of people polled by McAfee say they or someone they know has received a text or phone call from a scammer pretending to be from the IRS or a state tax agency, highlighting the growing threat of tax-related scams. The scammers use various tactics, including social media posts, emails, text messages, and phone calls, to target potential victims, often with promising fake refunds. To protect themselves, individuals can take steps such as filing their taxes early, monitoring their credit reports, watching out for phishing attacks, and being cautious of spoofed websites.

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.78

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

What Is Vishing? Voice Phishing Is Surging - Expert Tips on How to Spot It and Stop It Δ1.78

Vishing has become a prevalent tactic for cybercriminals, with 442% increase in attacks compared to the first half of 2024, according to CrowdStrike's latest report. The security firm tracked at least six campaigns involving attackers posing as IT staffers to convince employees to set up remote support sessions or share sensitive information. Help desk social engineering tactics are often used, where scammers create a sense of urgency to trick victims into divulging credentials.

Deepfake Scam Calls Are Costing British Victims Hundreds Each Time - Here's How to Stay Safe Δ1.77

The average scam cost the victim £595, report claims. Deepfakes are claiming thousands of victims, with a new report from Hiya detailing the rising risk and deepfake voice scams in the UK and abroad, noting how the rise of generative AI means deepfakes are more convincing than ever, and attackers can leverage them more frequently too. AI lowers the barriers for criminals to commit fraud, and makes scamming victims easier, faster, and more effective.

Fake LinkedIn Emails Contain Malware, Warns Security Expert Δ1.77

LinkedIn's InMail notification emails have been spoofed by cybercriminals to distribute malware. The emails are laced with phishing tactics, including fake companies, images, and notifications from legitimate platforms. Researchers at Cofense Intelligence warn that the attackers are using a ConnectWise Remote Access Trojan (RAT) to gain unauthorized control over systems.

The Dark Side of Chrome Extensions: Hidden Dangers Lurking on Your PC Δ1.77

As recent news reminds us, malicious browser add-ons can start life as legit extensions. Reviewing what you’ve got installed is a smart move. Earlier this month, an alarm sounded—security researchers at GitLab Threat Intelligence discovered a handful of Chrome extensions adding code in order to commit fraud, with at least 3.2 million users affected. But the add-ons didn’t start as malicious. Instead, they launched as legitimate software, only to be later compromised or sold to bad actors.

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks Δ1.77

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.

Aviaton Firms Hit by Devious New Polyglot Malware Δ1.77

Aviation firms in the United Arab Emirates (UAE) were recently targeted by a highly sophisticated business email compromise (BEC) attack looking to deploy advanced malware. The attackers used a compromised email account to share polyglot files with their victims, which deployed a hidden backdoor against aviation firms. Cybersecurity researchers Proofpoint observed that these attacks started in late 2024 and target organizations with a distinct interest in aviation and satellite communications.

Top Bluetooth Chip Security Flaw Could Put a Billion Devices at Risk Worldwide Δ1.76

A "hidden feature" was found in a Chinese-made Bluetooth chip that allows malicious actors to run arbitrary commands, unlock additional functionalities, and extract sensitive information from millions of Internet of Things (IoT) devices worldwide. The ESP32 chip's affordability and widespread use have made it a prime target for cyber threats, putting the personal data of billions of users at risk. Cybersecurity researchers Tarlogic discovered the vulnerability, which they claim could be used to obtain confidential information, spy on citizens and companies, and execute more sophisticated attacks.

Email Marketing Surges in 2025: Digital Silk Unveils Key Statistics and Trends Δ1.76

Email marketing continues to be a cornerstone for businesses aiming to engage with their audience effectively. Global email marketing revenue was projected to surpass $9.5 billion in 2024, highlighting its robust growth and sustained relevance. Consumer engagement with email remains high, with 96% of consumers checking their email daily, making it a vital touchpoint for marketers.