New MrAnon Stealer Malware Targeting German Users via Booking-Themed Scam

13/12/2023 0 Comments 0 tags

A phishing campaign has been observed delivering an information stealer malware called MrAnon Stealer to unsuspecting victims via seemingly benign booking-themed PDF lures. “This malware is a Python-based information stealer compressed with

Non-Human Access is the Path of Least Resistance: A 2023 Recap

13/12/2023 0 Comments 0 tags

2023 has seen its fair share of cyber attacks, however there’s one attack vector that proves to be more prominent than others – non-human access. With 11 high-profile attacks in 13

Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign

13/12/2023 0 Comments 0 tags

The Russian nation-state threat actor known as APT28 has been observed making use of lures related to the ongoing Israel-Hamas war to facilitate the delivery of a custom backdoor called HeadLace. IBM

Unveiling the Cyber Threats to Healthcare: Beyond the Myths

13/12/2023 0 Comments 0 tags

Let’s begin with a thought-provoking question: among a credit card number, a social security number, and an Electronic Health Record (EHR), which commands the highest price on a dark web forum? 

Microsoft’s Final 2023 Patch Tuesday: 33 Flaws Fixed, Including 4 Critical

13/12/2023 0 Comments 0 tags

Microsoft released its final set of Patch Tuesday updates for 2023, closing out 33 flaws in its software, making it one of the lightest releases in recent years. Of the 33 shortcomings,

Major Cyber Attack Paralyzes Kyivstar – Ukraine’s Largest Telecom Operator

13/12/2023 0 Comments 0 tags

Ukraine’s biggest telecom operator Kyivstar has become the victim of a “powerful hacker attack,” disrupting customer access to mobile and internet services. “The cyberattack on Ukraine’s #Kyivstar telecoms operator has impacted all regions

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing

13/12/2023 0 Comments 0 tags

Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks. “Threat actors compromise user accounts

How to Analyze Malware’s Network Traffic in A Sandbox

13/12/2023 0 Comments 0 tags

Malware analysis encompasses a broad range of activities, including examining the malware’s network traffic. To be effective at it, it’s crucial to understand the common challenges and how to overcome

Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities

13/12/2023 0 Comments 0 tags

Google is highlighting the role played by Clang sanitizers in hardening the security of the cellular baseband in the Android operating system and preventing specific kinds of vulnerabilities. This comprises Integer Overflow Sanitizer (IntSan)

BazaCall Phishing Scammers Now Leveraging Google Forms for Deception

13/12/2023 0 Comments 0 tags

The threat actors behind the BazaCall call back phishing attacks have been observed leveraging Google Forms to lend the scheme a veneer of credibility. The method is an “attempt to elevate the