Google Boots Multiple Malware-laced Android Apps from Marketplace
Google removed eight Android apps, with 3M cumulative downloads, from its marketplace for being infected with a Joker spyware variant.
Google has removed eight apps from its Google Play...
Journalists Emerge as Favored Attack Target for APTs
Since 2021, various state-aligned threat groups have turned up their targeting of journalists to siphon data and credentials and also track them.
Targeted phishing attacks are traced to multiple threat...
‘Callback’ Phishing Campaign Impersonates Security Firms
Victims instructed to make a phone call that will direct them to a link for downloading malware.
A new callback phishing campaign is impersonating prominent security companies to try to...
Sneaky Orbit Malware Backdoors Linux Devices
The novel threat steals data and can affect all processes running on the OS, stealing information from different commands and utilities and then storing it on the affected machine.
A...
U.S. Healthcare Orgs Targeted with Maui Ransomware
State-sponsored actors are deploying the unique malware–which targets specific files and leaves no ransomware note–in ongoing attacks.
Several federal agencies are warning healthcare organizations that they are under threat of...
ZuoRAT Can Take Over Widely Used SOHO Routers
Devices from Cisco, Netgear and others at risk from the multi-stage malware, which has been active since April 2020 and shows the work of a sophisticated threat actor.
A novel...
Latest Cyberattack Against Iran Part of Ongoing Campaign
Iran’s steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country’s rail system.
Malware used in a crippling cyberattacks against an Iranian steel plants last week is...
A Guide to Surviving a Ransomware Attack
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.
Surviving ransomware...
Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers.
The Cybersecurity and Infrastructure Security Agency (CISA) and Coast Guard Cyber Command (CGCYBER) released...
Mitel VoIP Bug Exploited in Ransomware Attacks
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
Ransomware groups are abusing unpatched versions of a Linux-based Mitel...