Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

29/03/2023 0 Comments 0 tags

A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and iOS devices, Google’s Threat Analysis Group (TAG) has revealed. The

Mélofée: Researchers Uncover New Linux Malware Linked to Chinese APT Groups

29/03/2023 0 Comments 0 tags

An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at Linux servers. French cybersecurity firm ExaTrack, which found three samples of the previously

How to Build a Research Lab for Reverse Engineering — 4 Ways

29/03/2023 0 Comments 0 tags

Malware analysis is an essential part of security researcher’s work. But working with malicious samples can be dangerous — it requires specialized tools to record their activity, and a secure

Smart Mobility has a Blindspot When it Comes to API Security

29/03/2023 0 Comments 0 tags

The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in the automotive industry. However, this increased reliance on APIs has

Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware

29/03/2023 0 Comments 0 tags

Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper malware designed to siphon cryptocurrencies since September 2022. “Clipboard injectors […] can

North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations

29/03/2023 0 Comments 0 tags

A new North Korean nation-state cyber operator has been attributed to a series of campaigns orchestrated to gather strategic intelligence that aligns with Pyongyang’s geopolitical interests since 2018. Google-owned Mandiant,

Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders

28/03/2023 0 Comments 0 tags

Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an attempt to offer “end-to-end defense at machine speed and scale.” Powered by OpenAI’s GPT-4 generative

IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery

28/03/2023 0 Comments 0 tags

Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited functionality that removes functionality related to online banking fraud. IcedID, also known

Breaking the Mold: Pen Testing Solutions That Challenge the Status Quo

28/03/2023 0 Comments 0 tags

Malicious actors are constantly adapting their tactics, techniques, and procedures (TTPs) to adapt to political, technological, and regulatory changes quickly. A few emerging threats that organizations of all sizes should

Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence

28/03/2023 0 Comments 0 tags

An advanced persistent threat (APT) group that has a track record of targeting India and Afghanistan has been linked to a new phishing campaign that delivers Action RAT. According to