From MuddyC3 to PhonyC2: Iran’s MuddyWater Evolves with a New Cyber Weapon

30/06/2023 0 Comments 0 tags

The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework called PhonyC2 that’s been put to use by the actor since 2021. Evidence shows that the

Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes

29/06/2023 0 Comments 0 tags

Cybersecurity researchers have shared the inner workings of an Android malware family called Fluhorse. The malware “represents a significant shift as it incorporates the malicious components directly within the Flutter code,”

The Right Way to Enhance CTI with AI (Hint: It’s the Data)

29/06/2023 0 Comments 0 tags

Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets and infrastructure – especially when combined with AI. But AI is only as good as

North Korean Hacker Group Andariel Strikes with New EarlyRat Malware

29/06/2023 0 Comments 0 tags

The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called EarlyRat in attacks exploiting the Log4j Log4Shell vulnerability last year. “Andariel infects machines by executing a

Android Spy App LetMeSpy Suffers Major Data Breach, Exposing Users’ Personal Data

29/06/2023 0 Comments 0 tags

Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an unauthorized third-party to steal sensitive data associated with thousands of Android users. “As a result of the

Critical Security Flaw in Social Login Plugin for WordPress Exposes Users’ Accounts

29/06/2023 0 Comments 0 tags

A critical security flaw has been disclosed in miniOrange’s Social Login and Register plugin for WordPress that could enable a malicious actor to log in as any user-provided information about email address

Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data

29/06/2023 0 Comments 0 tags

A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the wild with capabilities to harvest sensitive data from infected hosts. Fortinet FortiGuard Labs, which made the discovery, said it found

Alert: New Electromagnetic Attacks on Drones Could Let Attackers Take Control

28/06/2023 0 Comments 0 tags

Drones that don’t have any known security weaknesses could be the target of electromagnetic fault injection (EMFI) attacks, potentially enabling a threat actor to achieve arbitrary code execution and compromise

CryptosLabs Scam Ring Targets French-Speaking Investors, Rakes in €480 Million

28/06/2023 0 Comments 0 tags

Cybersecurity researchers have exposed the workings of a scam ring called CryptosLabs that’s estimated to have made €480 million in illegal profits by targeting users in French-speaking individuals in France,

5 Things CISOs Need to Know About Securing OT Environments

28/06/2023 0 Comments 0 tags

For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to fend for itself. Traditionally, few industrial enterprises had dedicated cybersecurity leaders. Any security