No menu items!
No menu items!
More

    News

    Must-Haves to Eliminate Credential Theft

    Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this...

    TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud

    Sep 13, 2024Ravie LakshmananFinancial Fraud / Mobile Security Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes...

    New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency

    Sep 13, 2024Ravie LakshmananEnterprise Security / Vulnerability Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency mining. The activity,...

    GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution

    Sep 12, 2024Ravie LakshmananDevSecOps / Vulnerability GitLab on Wednesday released security updates to address 17 security vulnerabilities, including a critical flaw that allows an...

    New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram

    Sep 12, 2024Ravie LakshmananMobile Security / Financial Fraud Bank customers in the Central Asia region have been targeted by a new strain of Android...

    Ireland’s Watchdog Launches Inquiry into Google’s AI Data Practices in Europe

    Sep 12, 2024Ravie LakshmananRegulatory Compliance / Data Protection The Irish Data Protection Commission (DPC) has announced that it has commenced a "Cross-Border statutory inquiry"...

    New Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwide

    Sep 12, 2024Ravie LakshmananMalware / IoT Security Nearly 1.3 million Android-based TV boxes running outdated versions of the operating system and belonging to users...

    Exposed Selenium Grid Servers Targeted for Crypto Mining and Proxyjacking

    Sep 12, 2024Ravie LakshmananCryptocurrency / Network Security Internet-exposed Selenium Grid instances are being targeted by bad actors for illicit cryptocurrency mining and proxyjacking campaigns. "Selenium...

    Iranian Cyber Group OilRig Targets Iraqi Government in Sophisticated Malware Attack

    Iraqi government networks have emerged as the target of an "elaborate" cyber attack campaign orchestrated by an Iran state-sponsored threat actor called OilRig. The...

    Latest articles

    spot_imgspot_img