Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

23/04/2025 0 Comments 0 tags

Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software. “The

Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack

23/04/2025 0 Comments 0 tags

The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part of a software supply chain attack designed to harvest and exfiltrate users’ private

Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito

23/04/2025 0 Comments 0 tags

Google on Tuesday revealed that it will no longer offer a standalone prompt for third-party cookies in its Chrome browser as part of its Privacy Sandbox initiative. “We’ve made the

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

22/04/2025 0 Comments 0 tags

Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine cryptocurrency. The activity cluster, per Darktrace and Cado Security, represents a shift

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

22/04/2025 0 Comments 0 tags

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that’s

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

22/04/2025 0 Comments 0 tags

In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed bogus emails to be sent via Google’s infrastructure and redirect

5 Major Concerns With Employees Using The Browser

22/04/2025 0 Comments 0 tags

As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, browsers remain mostly unmonitored, despite being responsible for more than

Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach

22/04/2025 0 Comments 0 tags

Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual machines (VMs) and that it’s also in the process of migrating the

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

22/04/2025 0 Comments 0 tags

The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February

SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks

21/04/2025 0 Comments 0 tags

A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals to conduct fraudulent cashouts. The active campaign is targeting customers of banking