Top

LATEST PUBLICATIONS



New Ransomware Strain ‘CACTUS’ Exploits VPN Flaws to Infiltrate Networks

May 9, 2023

Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks. “Once inside the network, CACTUS actors attempt to enumerate local […]


Apple and Google Join Forces to Stop Unauthorized Location-Tracking Devices

May 3, 2023

Apple and Google have teamed up to work on a draft industry-wide specification that’s designed to tackle safety risks and alert users when they are being tracked without their knowledge or permission using devices like AirTags. “The first-of-its-kind specification will […]


LimeRAT Malware Analysis: Extracting the Config

April 27, 2023

Remote Access Trojans (RATs) have taken the third leading position in ANY. RUN’s Q1 2023 report on the most prevalent malware types, making it highly probable that your organization may face this threat. Though LimeRAT might not be the most […]


Threats & Malware, Virus & Malware

Legion Malware Upgraded to Target SSH Servers and AWS Credentials

May 24, 2023

Via: The Hacker News

An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web Services (AWS) credentials associated with DynamoDB and CloudWatch. “This recent update demonstrates a widening of scope, with new capabilities such […]


Mobile, Mobile security

Data Stealing Malware Discovered in Popular Android Screen Recorder App

May 24, 2023

Via: The Hacker News

Google has removed a screen recording app named “iRecorder – Screen Recorder” from the Play Store after it was found to sneak in information stealing capabilities nearly a year after the app was published as an innocuous app. The app […]


Network security, Security

Improving Cybersecurity Requires Building Better Public-Private Cooperation

May 23, 2023

Via: Dark Reading

Cyber threats have a long reach. What seems like a low-level cyber incident can have a larger ripple effect, impacting millions of innocent people. A password breach that occurs in a private company, such as Colonial Pipeline, can end up […]


Threats & Malware, Virus & Malware

Bridgestone CISO: Lessons From Ransomware Attack Include Acting, Not Thinking

May 23, 2023

Via: Dark Reading

As a CISO that helped his company navigate through the aftermath of a crippling ransomware attack last year, Bridgestone Americas’ Tom Corridon says his biggest advice for other organizations is to designate key decision-makers for handling such crises before they […]


Hacker, Threats & Malware

U.K. Fraudster Behind iSpoof Scam Receives 13-Year Jail Term for Cyber Crimes

May 22, 2023

Via: The Hacker News

A U.K. national responsible for his role as the administrator of the now-defunct iSpoof online phone number spoofing service has been sentenced to 13 years and 4 months in prison. Tejay Fletcher, 35, of Western Gateway, London, was awarded the […]


Privacy protection, Security

Are Your APIs Leaking Sensitive Data?

May 22, 2023

Via: The Hacker News

It’s no secret that data leaks have become a major concern for both citizens and institutions across the globe. They can cause serious damage to an organization’s reputation, induce considerable financial losses, and even have serious legal repercussions. From the […]


Cyber-crime, Malware

Bad Magic’s Extended Reign in Cyber Espionage Goes Back Over a Decade

May 22, 2023

Via: The Hacker News

New findings about a hacker group linked to cyber attacks targeting companies in the Russo-Ukrainian conflict area reveal that it may have been around for much longer than previously thought. The threat actor, tracked as Bad Magic (aka Red Stinger), […]