Be Cautious of SpyNote, an Android Trojan That Records Both Audio and Phone Calls
October 17, 2023
The Android banking trojan known as SpyNote has been deconstructed, revealing its multifaceted information-gathering capabilities. According to F-Secure, the attack chains that deploy this spyware mainly propagate through SMS phishing operations. These chains are intricately designed to mislead…
0 Comments4 Minutes
Pro-Russian Hackers Exploiting New WinRAR Vulnerability in Phishing Campaign
October 16, 2023
In a targeted phishing campaign designed to extract sensitive credentials from compromised computers, pro-Russian hacking groups have leveraged a recently identified security flaw in the WinRAR archiving software, granting them unauthorized access to systems. “The attack involves the use of…
0 Comments6 Minutes
Cisco Issues Urgent Patch to Address Critical Flaw in Emergency Responder Systems
October 12, 2023
Cisco has swiftly taken action to mitigate a significant security vulnerability impacting Emergency Responder systems. This flaw has the potential to be exploited by remote, unauthenticated attackers, allowing unauthorized access to vulnerable systems through hard-coded credentials. Cisco’s…
0 Comments3 Minutes
BMC Firmware in Supermicro Reveals Multiple Critical Vulnerabilities
October 12, 2023
Recently, it was uncovered that Supermicro’s BMC firmware harbours numerous critical vulnerabilities. Security researchers have identified multiple flaws within the Intelligent Platform Management Interface (IPMI) firmware used in Supermicro baseboard management controllers (BMCs). These…
0 Comments6 Minutes
Microsoft Releases Patches for 103 Flaws in October 2023, Including 2 Active Exploits
October 11, 2023
Microsoft’s latest Patch Tuesday updates for October 2023 have been released, targeting a total of 103 vulnerabilities in its software. Notably, two of these vulnerabilities have already been actively exploited in the wild. [FREE E-BOOK] The Definite Blueprint for Cybersecurity in…
0 Comments4 Minutes
PEACHPIT: Ad Fraud Botnet on a Massive Scale – Millions of Hacked Android and iOS Devices
October 10, 2023
PEACHPIT, an ad fraud botnet, harnessed an army of hundreds of thousands of Android and iOS devices to generate illegal earnings for the scheme’s threat actors. This botnet is a component of a more extensive China-based operation called BADBOX, which includes the sale of off-brand mobile and…
0 Comments5 Minutes
Apple Releases Security Updates for Actively Exploited iOS Bug
October 5, 2023
On Wednesday, Apple swiftly released crucial security updates to address a newly discovered zero-day vulnerability in iOS and iPadOS. The company confirmed that this vulnerability was already under active exploitation in real-world scenarios. This kernel vulnerability, designated as CVE-2023-42824,…
0 Comments4 Minutes
Update Your Android Device Immediately! Google Addresses Two Actively Exploited Vulnerabilities.
October 5, 2023
In its latest round of security upgrades for October, Google has taken action to address a total of 53 vulnerabilities, with two of them currently under active exploitation by cyber threats. Google’s security alert suggests that these two vulnerabilities are being targeted in a focused and…
0 Comments6 Minutes
Microsoft Issues a Cyber Attack Warning Regarding Attempts to Hack Cloud Using SQL Server Instance
October 4, 2023
Attackers attempted lateral movement into a cloud environment via a SQL Server instance in a recent campaign, as outlined by Microsoft. In a report published on Tuesday, security experts Sunders Bruskin, Hagai Ran Kestenberg, and Fady Nasereldeen highlighted that “the attackers initially…
0 Comments4 Minutes
FBI Issues Warning About Rising Trend of Dual Ransomware Attacks on U.S. Businesses
October 3, 2023
Since at least July 2023, the FBI in the United States has been issuing warnings about a concerning new trend: simultaneous ransomware attacks targeting the same victims. According to an FBI advisory, these dual ransomware attacks involved two distinct versions selected from the following variants:…
0 Comments3 Minutes