Fake Trading Apps Target Victims Globally via Apple App Store and Google Play

02/10/2024 0 Comments 0 tags

A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well as phishing sites, to defraud victims, per findings from Group-IB.

Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals

02/10/2024 0 Comments 0 tags

A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent efforts to single out the sector under the guise of fake job applicant

Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit

02/10/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by malicious actors by exploiting a security vulnerability dubbed CosmicSting. Tracked as CVE-2024-34102 (CVSS

Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities

02/10/2024 0 Comments 0 tags

A little over a dozen new security vulnerabilities have been discovered in residential and enterprise routers manufactured by DrayTek that could be exploited to take over susceptible devices. “These vulnerabilities

Andariel Hacking Group Shifts Focus to Financial Attacks on U.S. Organizations

02/10/2024 0 Comments 0 tags

Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-sponsored threat actor called Andariel as part of a likely financially motivated attack. “While the

5 Must-Have Tools for Effective Dynamic Malware Analysis

02/10/2024 0 Comments 0 tags

Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program in the isolated environment of a malware sandbox to monitor

PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data

02/10/2024 0 Comments 0 tags

A new set of malicious packages has been unearthed in the Python Package Index (PyPI) repository that masqueraded as cryptocurrency wallet recovery and management services, only to siphon sensitive data

Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw

02/10/2024 0 Comments 0 tags

Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacor’s Zimbra Collaboration. Enterprise security firm Proofpoint said it began observing the activity starting September

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition

01/10/2024 0 Comments 0 tags

The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence (AI) for optical character recognition (OCR) as part of what’s

5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage

01/10/2024 0 Comments 0 tags

Since its emergence, Generative AI has revolutionized enterprise productivity. GenAI tools enable faster and more effective software development, financial analysis, business planning, and customer engagement. However, this business agility comes