Malware

Shai-Hulud cyberattack hits over 25,000 npm projects, stealing developer credentials

Shai-Hulud cyberattack targets more than 25,000 npm projects, stealing developers' credentials.

 Cyber Attacks: Phishing and Social Network Breaches
(Illustrative) A pager device and a crowd in Lebanon near a site where Hezbollah members' pager devices were attacked.

Expert: Preparation for Hezbollah pager explosions likely took months

Cyberattack (illustrative)

BiBi attacks Israel: Pro-Hamas hackers use new malware to attack Israeli companies

Cyber Attack, illustration.

Cyber criminals hack Internet users with advertising tools - HP


Chinese hackers could be a threat to your home internet router

Check Point, a cybersecurity software company, identified a group of Chinese hackers as responsible for integrating malicious code into router software.

 A router providing internet access.

FBI says it has sabotaged hacking tool created by elite Russian spies

The official identified the FSB hackers behind the malware with a notorious hacking group known as "Turla."

 Cyberattack on a smartphone. Beware of downloading spyware (Illustrative).

Rothman: Open gov't inquiry into 'NSO scandal' police wiretapping

Gottlieb said, "No one can pass the audit on themselves, and we should think about examining things with a governmental or state investigative committee."

 SIMCHA ROTHMAN, chairman of the Knesset Constitution, Law and Justice Committee, was said to have ‘ruffled a few feathers’ when he addressed the Jewish Federations of North America last week.

Iranian hackers targeted Israelis using rare cyberattack techniques

The new malware allows hackers to steal data from Telegram and take screenshots and record sound.

Iranian flag and cyber code [Illustrative]

Cybercriminals find new ways to seem legitimate: How can we spot them? - McAfee

Technology has become more advanced, and scammers have clocked on and are taking full advantage. McAfee's report explained how to spot the scams.

 The McAfee logo is displayed at the Mobile World Congress (MWC) in Barcelona on February 25, 2019.

Lenovo laptops vulnerable to dangerous malware, Israeli company finds

Over 100 models of Lenovo computers were found to be vulnerable to harmful malware by an Israeli cybersecurity company.

 A Lenovo laptop computer is displayed with the Microsoft Windows 7 operating system at a computer store in Hong Kong November 5, 2009

NSO's Pegasus: How to know you're being tracked - and how to stop it

Do you think your phone is being targeted? These signs could help determine if you've been hacked and what you can do about it.

 Social media: Instagram, Twitter, Facebook, LinkedIn, TikTok

Microsoft detects malware in systems belonging to Ukraine gov't

The victims of the malware include Ukrainian government agencies that provide critical executive branch or emergency response functions, Microsoft said.

 View of the Microsoft offices in Herzliya, Israel, on May 28, 2021

Cyber attacks on hospitals can kill - here's why

In Israel specifically, any one hospital being unable to conduct MRI and CT scans, which run 24/7 and are backlogged, could impact the country nationwide. 

Projection of cyber code on hooded man (llustrative)

Prestigious EU journalism prize awarded to Israeli malware investigation

The 'Pegasus Project' investigation concluded that people across 50 countries had been targeted for potential surveillance.

SECURITY SURVEILLANCE monitors. Privacy advocates argue that even if the official transfer of data does not identify individuals, anyone who wants to abuse the information to invade an individual’s privacy can do so with ease

Massive data leak uncovers human rights abuses using Israeli tech - report

The leak contains a list of over 50,000 phone numbers that the report estimated were identified as “people of interest” by clients of Israeli spyware company NSO Group since 2016.

SECURITY SURVEILLANCE monitors. Privacy advocates argue that even if the official transfer of data does not identify individuals, anyone who wants to abuse the information to invade an individual’s privacy can do so with ease