UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware

22/12/2023 0 Comments 0 tags

The threat actor known as UAC-0099 has been linked to continued attacks aimed at Ukraine, some of which leverage a high-severity flaw in the WinRAR software to deliver a malware strain called

Microsoft Warns of New ‘FalseFont’ Backdoor Targeting the Defense Sector

22/12/2023 0 Comments 0 tags

Organizations in the Defense Industrial Base (DIB) sector are in the crosshairs of an Iranian threat actor as part of a campaign designed to deliver a never-before-seen backdoor called FalseFont.

Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware

21/12/2023 0 Comments 0 tags

A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between reboots is offered as an “add-on feature” and that it depends on

Chameleon Android Banking Trojan Variant Bypasses Biometric Authentication

21/12/2023 0 Comments 0 tags

Cybersecurity researchers have discovered an updated version of an Android banking malware called Chameleon that has expanded its targeting to include users in the U.K. and Italy. “Representing a restructured

New JavaScript Malware Targeted 50,000+ Users at Dozens of Banks Worldwide

21/12/2023 0 Comments 0 tags

A new piece of JavaScript malware has been observed attempting to steal users’ online banking account credentials as part of a campaign that has targeted more than 40 financial institutions

Cost of a Data Breach Report 2023: Insights, Mitigators and Best Practices

21/12/2023 0 Comments 0 tags

John Hanley of IBM Security shares 4 key findings from the highly acclaimed annual Cost of a Data Breach Report 2023 What is the IBM Cost of a Data Breach

German Authorities Dismantle Dark Web Hub ‘Kingdom Market’ in Global Operation

21/12/2023 0 Comments 0 tags

German law enforcement has announced the disruption of a dark web platform called Kingdom Market that specialized in the sales of narcotics and malware to “tens of thousands of users.” The exercise, which

Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware

21/12/2023 0 Comments 0 tags

Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of malware called Agent Tesla. The infection chains leverage decoy Excel documents attached in

Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild – Update ASAP

21/12/2023 0 Comments 0 tags

Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day flaw that it said has been exploited in the wild. The vulnerability, assigned the

Product Explained: Memcyco’s Real-Time Defense Against Website Spoofing

20/12/2023 0 Comments 0 tags

Hands-On Review: Memcyco’s Threat Intelligence Solution Website impersonation, also known as brandjacking or website spoofing, has emerged as a significant threat to online businesses. Malicious actors clone legitimate websites to