Category: CyberSecurityNews

Antidot Mobile Malware As Google Play Update Hijacks Device Control
20
May
2024

Antidot Mobile Malware As Google Play Update Hijacks

Cybersecurity experts have found a new banking Trojan horse for Android smartphones. It’s called Antidot. This clever malware pretends to…

Evolution of AI Technologies Fueling the Social Engineering Attacks
20
May
2024

Evolution of AI Technologies Fueling the Social Engineering Attacks

With the rise of AI technologies, scamming, the illegal act of tricking others in an unethical way to obtain money,…

Students Uncover Security Bug That Could Let Millions Do Their Laundry For Free
20
May
2024

Students Uncover Security Bug That Could Do Laundry For Free

Two UC Santa Cruz students found a major security flaw in CSC ServiceWorks laundry machines. Over a million internet-connected laundry…

APT Hackers Attacking Manufacturers With Keyloggers, Infostealers, & Proxy Tools
20
May
2024

APT Hackers Attacking Manufacturers With Keyloggers, Infostealers, & Proxy Tools

The Andariel APT group launched a targeted attack campaign against South Korean domestic companies and institutions, where manufacturing, construction, and…

Beware! Android Banking Trojan Mimics As Google Play Updates
20
May
2024

Beware! Android Banking Trojan Mimics As Google Play Updates

A new Android banking Trojan, Antidot, emerged in May 2024, which steals credentials through overlay attacks and has various functionalities…

LATRODECTUS Loader Getting Popular Among Cybercriminals, Is It Replacing ICEDID!
19
May
2024

LATRODECTUS Loader Getting Popular Among Cybercriminals, Is It Replacing ICEDID!

Hackers use loaders to bypass security measures and run harmful code in a genuine process’s memory themselves.  This makes it…

30+ Tesla Cars Hacked Globally Using Third-Party Software
17
May
2024

30+ Tesla Cars Hacked Globally Using Third-Party Software

A security researcher identified a vulnerability in TeslaLogger, a third-party software used to collect data from Tesla vehicles, that leveraged…

ANY.RUN Threat Intelligence Lookup - A Complete Guide
17
May
2024

How to Use Threat Intelligence Feeds for SOC/DFIR Teams

Threat intelligence feeds provide real-time updates on indicators of compromise (IOCs), such as malicious IPs and URLs. Security researchers and…

YARA, the Malware Researchers Toolbox Evolved
17
May
2024

YARA, the Malware Researchers Toolbox Evolved

Malware experts all over the world can’t do their jobs without YARA. YARA has been updated many times to add…

New Cyber Attack Targeting Facebook Business Accounts
17
May
2024

New Cyber Attack Targeting Facebook Business Accounts

The email campaign impersonates the Facebook Ads Team to trick users into clicking a malicious link, as the email leverages…

SugarGh0st RAT Attacking Organizations & Individuals in AI Research
17
May
2024

SugarGh0st RAT Attack Organizations & Individuals in AI Research

The cybersecurity company Proofpoint has found a new operation using the SugarGh0st Remote Access Trojan (RAT) that is going after…

Two Brothers Arrested for Attacking Blockchain & Stealing M
17
May
2024

Two Brothers Arrested for Attacking Blockchain & Stealing $25M

Jason Peraire-Bueno, 28, of New York, and Anton Peraire-Bueno, 24, of Boston have been charged with wire fraud, plot to…