Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

02/05/2024 0 Comments 0 tags

Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app’s home directory.

Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million

02/05/2024 0 Comments 0 tags

A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay $16 million in restitution for carrying out thousands of ransomware attacks and extorting

When is One Vulnerability Scanner Not Enough?

02/05/2024 0 Comments 0 tags

Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample is

Dropbox Discloses Breach of Digital Signature Service Affecting All Users

02/05/2024 0 Comments 0 tags

Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors, who accessed emails, usernames, and general account settings associated with all users of the

New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw

02/05/2024 0 Comments 0 tags

A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using the compromised devices for further attacks. The vulnerability in question is CVE-2015-2051 (CVSS score: 9.8),

CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability

02/05/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild. Tracked as CVE-2023-7028 (CVSS score:

New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials

02/05/2024 0 Comments 0 tags

A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the devices and gather authentication data from HTTP GET and POST requests. “This

Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds

01/05/2024 0 Comments 0 tags

A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto

Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

01/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual command-and-control (C2) servers for detection evasion. The malware, codenamed Wpeeper,

Everyone’s an Expert: How to Empower Your Employees for Cybersecurity Success

01/05/2024 0 Comments 0 tags

There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you’ve got to remain prepared to confront those very same threats. As