Real-Time Code-Level Scanning is Now Available for Android Malware Thanks to Google Play Protect
October 19, 2023
An update to Google’s Play Protect has been released, and the company has revealed that it will now offer real-time scanning at the code level. This will allow Google to combat newly discovered harmful apps before users download and install them on Android devices. “Google Play Protect…
0 Comments4 Minutes
Lazarus Group Is Going After Defense Experts Using Bogus Interviews Conducted Through Trojanized VNC Apps.
October 18, 2023
As part of a long-running campaign known as Operation Dream Job, the Lazarus Group which has ties to North Korea and is also known as Hidden Cobra or TEMP. Hermit has been seen employing trojanized versions of Virtual Network Computing (VNC) software as lures to target individuals working in the…
0 Comments6 Minutes
Be Cautious of SpyNote, an Android Trojan That Records Both Audio and Phone Calls
October 17, 2023
The Android banking trojan known as SpyNote has been deconstructed, revealing its multifaceted information-gathering capabilities. According to F-Secure, the attack chains that deploy this spyware mainly propagate through SMS phishing operations. These chains are intricately designed to mislead…
0 Comments4 Minutes
Pro-Russian Hackers Exploiting New WinRAR Vulnerability in Phishing Campaign
October 16, 2023
In a targeted phishing campaign designed to extract sensitive credentials from compromised computers, pro-Russian hacking groups have leveraged a recently identified security flaw in the WinRAR archiving software, granting them unauthorized access to systems. “The attack involves the use of…
0 Comments6 Minutes
Cisco Issues Urgent Patch to Address Critical Flaw in Emergency Responder Systems
October 12, 2023
Cisco has swiftly taken action to mitigate a significant security vulnerability impacting Emergency Responder systems. This flaw has the potential to be exploited by remote, unauthenticated attackers, allowing unauthorized access to vulnerable systems through hard-coded credentials. Cisco’s…
0 Comments3 Minutes
BMC Firmware in Supermicro Reveals Multiple Critical Vulnerabilities
October 12, 2023
Recently, it was uncovered that Supermicro’s BMC firmware harbours numerous critical vulnerabilities. Security researchers have identified multiple flaws within the Intelligent Platform Management Interface (IPMI) firmware used in Supermicro baseboard management controllers (BMCs). These…
0 Comments6 Minutes
Microsoft Releases Patches for 103 Flaws in October 2023, Including 2 Active Exploits
October 11, 2023
Microsoft’s latest Patch Tuesday updates for October 2023 have been released, targeting a total of 103 vulnerabilities in its software. Notably, two of these vulnerabilities have already been actively exploited in the wild. [FREE E-BOOK] The Definite Blueprint for Cybersecurity in…
0 Comments4 Minutes
PEACHPIT: Ad Fraud Botnet on a Massive Scale – Millions of Hacked Android and iOS Devices
October 10, 2023
PEACHPIT, an ad fraud botnet, harnessed an army of hundreds of thousands of Android and iOS devices to generate illegal earnings for the scheme’s threat actors. This botnet is a component of a more extensive China-based operation called BADBOX, which includes the sale of off-brand mobile and…
0 Comments5 Minutes
Apple Releases Security Updates for Actively Exploited iOS Bug
October 5, 2023
On Wednesday, Apple swiftly released crucial security updates to address a newly discovered zero-day vulnerability in iOS and iPadOS. The company confirmed that this vulnerability was already under active exploitation in real-world scenarios. This kernel vulnerability, designated as CVE-2023-42824,…
0 Comments4 Minutes
Update Your Android Device Immediately! Google Addresses Two Actively Exploited Vulnerabilities.
October 5, 2023
In its latest round of security upgrades for October, Google has taken action to address a total of 53 vulnerabilities, with two of them currently under active exploitation by cyber threats. Google’s security alert suggests that these two vulnerabilities are being targeted in a focused and…
0 Comments6 Minutes