Week in review: Exploitable flaws in corporate VPN clients, malware loader created with gaming engine
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Researchers reveal exploitable flaws in […]
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Researchers reveal exploitable flaws in […]
A new set of 15 SpyLoan Android malware apps with over 8 million installs was discovered on Google Play, targeting
SpyLoan Android malware on Google play installed 8 million times Read Post »
A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested by law
Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested Read Post »
A new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials.
New Rockstar 2FA phishing service targets Microsoft 365 accounts Read Post »
Noteworthy stories that might have slipped under the radar: OnePoint Patient Care data breach impact doubles, a US soldier may
T-Mobile has confirmed being targeted by hackers, likely China’s Salt Typhoon, but reiterated that the attack was blocked. The post
T-Mobile Shares More Information on China-Linked Cyberattack Read Post »
Microsoft informed customers that vulnerabilities affecting cloud, AI and other services have been patched, including an exploited flaw. The post
Microsoft Patches Exploited Vulnerability in Partner Network Website Read Post »
ESET warns of a new reality: “UEFI bootkits are no longer confined to Windows systems alone.” The post ESET Flags
ESET Flags Prototype UEFI Bootkit Targeting Linux Read Post »
The Banshee Stealer macOS malware operation, which emerged earlier this year, was reportedly shut down following a source code leak.
Source Code of $3,000-a-Month macOS Malware ‘Banshee Stealer’ Leaked Read Post »