Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware

21/12/2023 0 Comments 0 tags

A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between reboots is offered as an “add-on feature” and that it depends on

German Authorities Dismantle Dark Web Hub ‘Kingdom Market’ in Global Operation

21/12/2023 0 Comments 0 tags

German law enforcement has announced the disruption of a dark web platform called Kingdom Market that specialized in the sales of narcotics and malware to “tens of thousands of users.” The exercise, which

Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware

21/12/2023 0 Comments 0 tags

Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of malware called Agent Tesla. The infection chains leverage decoy Excel documents attached in

Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild – Update ASAP

21/12/2023 0 Comments 0 tags

Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day flaw that it said has been exploited in the wild. The vulnerability, assigned the

Alert: Chinese-Speaking Hackers Pose as UAE Authority in Latest Smishing Wave

20/12/2023 0 Comments 0 tags

The Chinese-speaking threat actors behind Smishing Triad have been observed masquerading as the United Arab Emirates Federal Authority for Identity and Citizenship to send malicious SMS messages with the ultimate goal of

Product Explained: Memcyco’s Real-Time Defense Against Website Spoofing

20/12/2023 0 Comments 0 tags

Hands-On Review: Memcyco’s Threat Intelligence Solution Website impersonation, also known as brandjacking or website spoofing, has emerged as a significant threat to online businesses. Malicious actors clone legitimate websites to

Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster

20/12/2023 0 Comments 0 tags

Ransomware groups are increasingly switching to remote encryption in their attacks, marking a new escalation in tactics adopted by financially motivated actors to ensure the success of their campaigns. “Companies

New Go-Based JaskaGO Malware Targeting Windows and macOS Systems

20/12/2023 0 Comments 0 tags

A new Go-based information stealer malware called JaskaGO has emerged as the latest cross-platform threat to infiltrate both Windows and Apple macOS systems. AT&T Alien Labs, which made the discovery, said the malware is

3,500 Arrested in Global Operation HAECHI-IV Targeting Financial Criminals

20/12/2023 0 Comments 0 tags

A six-month-long international police operation codenamed HAECHI-IV has resulted in the arrests of nearly 3,500 individuals and seizures worth $300 million across 34 countries. The exercise, which took place from July through

Hackers Abusing GitHub to Evade Detection and Control Compromised Hosts

19/12/2023 0 Comments 0 tags

Threat actors are increasingly making use of GitHub for malicious purposes through novel methods, including abusing secret Gists and issuing malicious commands via git commit messages. “Malware authors occasionally place