New Linux Malware Linked With 3CX Supply-Chain Attack
21
Apr
2023

New Linux Malware Linked With 3CX Supply-Chain Attack

ESET researchers have recently discovered that Linux users targeted with malware in the new “Operation DreamJob” Lazarus campaign for the…

Prototype cyber tech has revolutionary potential
21
Apr
2023

Prototype cyber tech has revolutionary potential

The early findings of a pioneering cyber security project are showing promising signs that a novel technological approach implemented in…

Q&A with a Crowdsource hacker: Sebastian Neef a.k.a. Gehaxelt
21
Apr
2023

Q&A with Crowdsource hacker Gehaxelt

Detectify Crowdsource hacker Sebastian Neef, otherwise known as Gehaxelt, has an inspirational background in ethical hacking. Driven by curiosity, a…

Russia-linked APT28 Group Exploiting Cisco Routers
21
Apr
2023

Russia-linked APT28 Group Exploiting Cisco Routers

A recent report from CISA (US Cybersecurity and Infrastructure Security Agency)  revealed that the APT 28 group was responsible for…

Indian Cyber Mafia targeting Indonesia
21
Apr
2023

OpIndia2.0, Retaliation To Indian Cyber Mafia Targeting Indonesia

A new group of hackers, which calls itself the ‘Indian Cyber Mafia’, has allegedly launched cyberattacks on Indonesian universities. This…

Detectify hacker heroes hakluke
21
Apr
2023

Meet a Hacker Hero: Hakluke

Detectify collaborates with Crowdsource, our private network of ethical hackers to help our customers access the latest critical security research…

fortnite
21
Apr
2023

University websites using MediaWiki, TWiki hacked to serve Fortnite spam

Websites of multiple U.S. universities are serving Fortnite and ‘gift card’ spam. Researchers observed Wiki and documentation pages being hosted by universities including Stanford, MIT, Berkeley,…

After Indian Railways, ShadowHacker Claims Access to Freshersworld Database
21
Apr
2023

ShadowHacker Claims Access To Freshersworld Database

A hacker group known as ShadowHacker has claimed to have gained access to the database of freshersworld.com, a popular website…

Adorable bookmarklets want to help delete your social media data
21
Apr
2023

Adorable bookmarklets want to help delete your social media data

Bookmarklets you can use in your browser to help clean up your social media data. A little while ago I…

Is Twitter Blue Tick removal a data security concern
21
Apr
2023

Is Twitter Blue Tick removal a data security concern

A few years back, many people started creating fake twitter profiles to propagate fake news and to indulge in an…

DAAM Android Botnet
21
Apr
2023

Malicious Trojanized Apps Distribute DAAM Android Botnet

Android users beware: a new Android botnet called DAAM is distributed through Trojanized applications. This was recently discovered by Cyble…

Understanding the Different Types and How to Detect Them
21
Apr
2023

Understanding the Different Types and How to Detect Them

Spyware is a type of malicious software designed to gather data from a computer system without the user’s knowledge or…