New Android Spyware LianSpy Evades Detection Using Yandex Cloud

06/08/2024 0 Comments 0 tags

Users in Russia have been the target of a previously undocumented Android post-compromise spyware called LianSpy since at least 2021. Cybersecurity vendor Kaspersky, which discovered the malware in March 2024,

Google Patches New Android Kernel Vulnerability Exploited in the Wild

06/08/2024 0 Comments 0 tags

Google has addressed a high-severity security flaw impacting the Android kernel that it has been actively exploited in the wild. The vulnerability, tracked as CVE-2024-36971, has been described as a

New Zero-Day Flaw in Apache OFBiz ERP Allows Remote Code Execution

06/08/2024 0 Comments 0 tags

A new zero-day pre-authentication remote code execution vulnerability has been disclosed in the Apache OFBiz open-source enterprise resource planning (ERP) system that could allow threat actors to achieve remote code

The Loper Bright Decision: How it Impacts Cybersecurity Law

05/08/2024 0 Comments 0 tags

The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years of administrative law, leading to potential litigation over the interpretation of ambiguous laws previously decided

Kazakh Organizations Targeted by ‘Bloody Wolf’ Cyber Attacks

05/08/2024 0 Comments 0 tags

Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a commodity malware called STRRAT (aka Strigoi Master). “The program selling for as little

Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

05/08/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered design weaknesses in Microsoft’s Windows Smart App Control and SmartScreen that could enable threat actors to gain initial access to target environments without raising any warnings.

Enhancing Incident Response Readiness with Wazuh

05/08/2024 0 Comments 0 tags

Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection, comprehensive data collection, and coordinated actions to

Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access

05/08/2024 0 Comments 0 tags

A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol (CIP) programming and configuration commands. The flaw,

China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates

05/08/2024 0 Comments 0 tags

The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to push malicious software updates to target companies in mid-2023, highlighting a new level of

New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data

05/08/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an aim to steal financial information. “BlankBot features a range of malicious capabilities, which include