QAKBOT Attacks Spike Amid Concerning Cybercriminal Collaborations
The QAKBOT malware group resumed expanding its access-as-a-service network in early September, successfully compromising hundreds of companies with common second-stage payloads, including Emotet malware and two popular attack platforms,...
WhatsApp Users Beware: Dangerous Mobile Trojan Being Distributed via Malicious Mod
Security researchers have detected a threat actor distributing a data-stealing mobile Trojan via a spoofed version of YoWhatsApp, a relatively widely used, modified version of the WhatsApp messaging application.Users...
Android Leaks Wi-Fi Traffic Even When VPN Protection Features Are On
Android devices are leaking certain traffic when a mobile device is connected to a Wi-Fi network, even when features aimed to protect data being sent over the public Internet by...
Airborne Drones Are Dropping Cyber-Spy Exploits in the Wild
Once limited to abstract academic conversation among cybersecurity enthusiasts, drones loaded with cyber-spying equipment are now being used in the real world to breach networks and steal information.Cybersecurity researcher...
High-Value Targets: String of Aussie Telco Breaches Continues
First it was Optus, followed by Telstra. Now, a third Australian telecom company has disclosed it was breached — this time it's Dialog, an information technology services provider with...
Intel Processor UEFI Source Code Leaked
Intel has confirmed the leak of the Unified Extensible Firmware Interface (UEFI) BIOS of Alder Lake, the company's code name for its latest processor — the 12th generation Intel Core processor —...
Emotet Rises Again With More Sophistication, Evasion
The threat group behind the Emotet malware-delivery botnet has resurrected the malware-as-a-service offering with more sophisticated countermeasures to foil takedowns.
According to a 68-page analysis on Oct. 10 from VMware's Threat Analysis Unit —...
US Airports in Cyberattack Crosshairs for Pro-Russian Group Killnet
Hot on the heels of attacks against US state government websites, pro-Russian threat group Killnet on Monday disrupted the websites of multiple US airports in a series of distributed...
6 Things Every CISO Should Do the First 90 Days on the Job
Not too long ago, the role of chief information security officer was a purely technical position designed to help an organization overcome cybersecurity challenges. Today, however, the CISO role...
Zimbra RCE Bug Under Active Attack
Administrators running Zimbra servers are being warned to update their systems with the "pax" utility by researchers, who have observed cyberattackers actively attempting to exploit a known flaw.
Zimbra is a...