The Latest in IT Security

1

The days are numbered for hackers using Excel’s XLL features to deliver malware to Microsoft customers, the company has announced. XLL files are similar to DLL files and provide the program with a number of advanced features, including custom functions and toolbars. Crooks have been using XLL files in phishing attacks, successfully delivering malware, infostealers, […]

Read more ...

1

An electronic health records vendor and a pharmacy management services firm are purportedly among the latest healthcare sector victims of ransomware-as-a-service group BlackCat, also known as Alphv. Irvine, California-based NextGen Healthcare, which offers cloud-based EHRs, and Blanco, Texas-based PharmaCare Services, a provider of pharmacy management and consulting services, appeared on BlackCat’s leak site late last […]

Read more ...

1

Remote access trojans such as StrRAT and Ratty are being distributed as a combination of polyglot and malicious Java archive (JAR) files, once again highlighting how threat actors are continuously finding new ways to fly under the radar. “Attackers now use the polyglot technique to confuse security solutions that don’t properly validate the JAR file […]

Read more ...


Categories

SUNDAY, MARCH 16, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments