OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details
14
Oct
2024

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on critical infrastructure in the UAE and…

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns & PINs
14
Oct
2024

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns & PINs

TrickMo is a sophisticated malware that emerged as a “banking Trojan”, and this malware is designed to steal “financial credentials”…

Naveen Goud
14
Oct
2024

Lack of Cyber Talent is creating new opportunities to Cyber Threat Actors

It is evident that in the absence of vigilant oversight and corrective measures, situations can deteriorate rapidly, often leading to…

Ecovacs robot army
14
Oct
2024

Robot vacuum cleaners hacked to spy on, insult owners

Multiple robot vacuum cleaners in the US were hacked to yell obscenities and insults through the onboard speakers. ABC news…

Nintendo
14
Oct
2024

Pokemon dev Game Freak confirms breach after stolen data leaks online

Japanese video game developer Game Freak has confirmed it suffered a cyberattack in August after source code and game designs…

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details
14
Oct
2024

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

OilRig hackers (aka Earth Simnavaz, APT34, OilRig) is a cyber espionage group that was linked to “Iranian” interests. This APT…

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs
14
Oct
2024

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further investigation, where researchers have identified 40…

Transforming Security Testing With AI: Benefits and Challenges
14
Oct
2024

Transforming Security Testing With AI: Benefits and Challenges

Security testing plays a critical role in ensuring that applications are protected against vulnerabilities and attacks. In times when cyber…

Supply Chain Attack Leveraging Entry Points
14
Oct
2024

Supply Chain Attack Leveraging Entry Points in PyPI, npm, Ruby Gems & NuGet

A sophisticated supply chain attack has been identified, leveraging entry points in popular open-source package repositories, including PyPI (Python), npm…

CoreWarrior Malware Attacking Windows Machines With Self-replication Capabilities
14
Oct
2024

CoreWarrior Malware Attacking Windows Machines With Self-replication Capabilities

Malware targeting Windows machines continues to be a significant threat. While these threats could be in various forms like viruses,…

The War on Passwords Is One Step Closer to Being Over
14
Oct
2024

The War on Passwords Is One Step Closer to Being Over

The password-killing tech known as “passkeys” have proliferated over the last two years, developed by the tech industry association known…

Researchers Win $70K for Reporting Zero-Day Flaws in EV Chargers
14
Oct
2024

Zero-day Flaws Exposed EV Chargers to Shutdowns and Data Theft

NCC Group experts share details of how they exploited critical zero-day vulnerabilities in Phoenix Contact EV chargers (electric vehicles chargers)…