Cyber Threats this holiday season you should be aware of
December 18, 2023
As we revel in the joy and generosity of the holiday season, it’s crucial to be mindful of an increased risk of falling victim to Cyber Threats this holiday season Unfortunately, cybercriminals seize this festive period to exploit our festive cheer and gift-giving spirit. During these…
0 Comments10 Minutes
Microsoft Takes Legal Action to Dismantle Storm-1152’s Cybercrime Network
December 15, 2023
On Wednesday, Microsoft announced a significant step in combating cybercrime by obtaining a court order to seize the infrastructure established by the group known as Storm-1152. This group orchestrated the sale of approximately 750 million counterfeit Microsoft accounts and tools to fellow…
0 Comments4 Minutes
Google is using Clang sanitizers to keep Android safe
December 13, 2023
Google is using Clang sanitizers to keep Android safe, enhancing the security of the Android operating system’s cellular baseband, effectively thwarting specific types of vulnerabilities. Key components in this security strategy are the Integer Overflow Sanitizer (IntSan) and BoundsSanitizer…
0 Comments4 Minutes
New MrAnon Stealer Malware’s Booking-Themed Scam
December 12, 2023
Phishing campaigns have recently adopted a cunning approach by employing PDFs. The unsuspecting victims, lured by the promise of exciting travel content, unknowingly fall prey to the notorious New MrAnon Stealer Malware’s —a potent malware designed for information theft. According to Cara…
0 Comments4 Minutes
The Sandman APT’s Secret Link to the Keyplug Backdoor in China
December 11, 2023
Researchers have uncovered intriguing parallels between the elusive advanced persistent threat (APT) known as Sandman and a threat cluster based in China, notorious for deploying the KEYPLUG backdoor. The collaborative report from SentinelOne, PwC, and the Microsoft Threat Intelligence team reveals…
0 Comments6 Minutes
iPhone Users Beware: Sneaky Attack Utilizing a Fake Lockdown Mode
December 5, 2023
Security experts have recently uncovered a sophisticated “post-exploitation tampering technique” that malicious actors can exploit. This technique allows them to execute covert attacks by visually deceiving iPhone users into thinking their device is in Lockdown Mode, even when…
0 Comments4 Minutes
BLUFFS Bluetooth Attack is Putting Devices at Risk
December 4, 2023
Recent investigations have brought to light a series of sophisticated attacks posing a significant threat to the forward secrecy and future secrecy guarantees of Bluetooth Classic. These exploits specifically create scenarios for adversary-in-the-middle (AitM) attacks between already connected peer…
0 Comments6 Minutes
Google’s New Defense Against Spam and Malicious Emails
November 30, 2023
With the intention of assisting in the identification of potentially hazardous information in Gmail, such as spam and phishing emails, Google has introduced a new multilingual text vectorizer that goes by the name RETVec (which is an abbreviation for Resilient and Efficient Text Vectorizer).…
0 Comments4 Minutes
North Korea’s Lazarus Group has made $3 billion out of cryptocurrency hacks.
November 30, 2023
Since at least 2017, threat actors from the Democratic People’s Republic of Korea (DPRK) have been focusing on the cryptocurrency sector as a way to generate revenue and evade sanctions. In a report shared with The Hacker News, cybersecurity firm Recorded Future stated that “the…
0 Comments5 Minutes
The Methods Cybercriminals Use to Get Your Users’ Passwords and Then Sell Them
November 28, 2023
The value of account credentials has increased in the cybercrime market since they are a common initial access vector. Consequently, your company’s entire network could be at risk from just one pair of compromised credentials. Data breaches that happened between November 2021 and October 2022…
0 Comments9 Minutes