Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware
Jun 13, 2024NewsroomThreat Intelligence / Mobile Security The threat actor known as Arid Viper has been attributed to a mobile espionage campaign that leverages trojanized…
Jun 13, 2024NewsroomThreat Intelligence / Mobile Security The threat actor known as Arid Viper has been attributed to a mobile espionage campaign that leverages trojanized…
A vulnerability in the Microsoft Windows Error Reporting Service, which was identified and patched three months ago in the March 2024 Patch Tuesday update, appears…
YouTube reportedly now injects ads directly into video streams to make it more difficult for ad blockers to block advertisements. The report comes from SponsorBlock,…
WARMCOOKIE is a new Windows backdoor that is deployed by a phishing effort with a recruiting theme dubbed REF6127. The WARMCOOKIE backdoor can be used…
Cybercriminals are constantly on the lookout for ways to infiltrate our devices and steal our personal information. Data breaches have become a common occurrence, leaving…
Jun 13, 2024NewsroomVulnerability / Software Security The security risks posed by the Pickle format have once again come to the fore with the discovery of…
Google fixed an actively exploited zero-day in the Pixel Firmware Pierluigi Paganini June 13, 2024 Google is warning of a security vulnerability impacting its Pixel…
A significant vulnerability, tracked as CVE-2024-37629, has been discovered in SummerNote 0.8.18. It allows Cross-Site Scripting (XSS) via the Code View Function. Summernote is a…
Google has notified Pixel users about an actively exploited vulnerability in their phones’ firmware. Firmware is the code or program which is embedded into hardware…
As organisations store and process data in the cloud, there are increasing concerns from administrators, data owners and CISOs’ around the possibility of misconfiguration or…
Hackers misuse malware for diverse illicit intentions, including data theft, disrupting systems, espionage, or distortion for unethical monetary benefits. Besides this malware is also helpful…
Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group. The group has been exploiting a known vulnerability (CVE-2017-11882) in the Microsoft…