Android Keyboard Apps with 2 Million downloads can remotely hack your device

3 years ago

Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile…

New Go-based Redigo malware targets Redis servers

3 years ago

Redigo is a new Go-based malware employed in attacks against Redis servers affected by the CVE-2022-0543 vulnerability. Researchers from security firm…

3 of the Worst Data Breaches in the World That Could Have Been Prevented

3 years ago

Data breaches can be devastating for organizations, these are 3 of the worst incidents that could have been prevented Data…

North Korea ScarCruft APT used previously undetected Dolphin Backdoor against South Korea

3 years ago

North Korea-linked ScarCruft group used a previously undocumented backdoor called Dolphin against targets in South Korea. ESET researchers discovered a previously undocumented backdoor called Dolphin…

Lastpass discloses the second security breach this year

3 years ago

LastPass disclosed a new security breach, threat actors had access to its cloud storage using information stolen in the August…

Google links three exploitation frameworks to Spanish commercial spyware vendor Variston

3 years ago

Google’s Threat Analysis Group (TAG) linked three exploitation frameworks to a Spanish surveillance spyware vendor named Variston. While tracking the…

Attackers abused the popular TikTok Invisible Challenge to spread info-stealer

3 years ago

Threat actors are exploiting interest in a popular TikTok challenge, dubbed Invisible Challenge, to trick users into downloading info-stealing malware.…

China-linked UNC4191 APT relies on USB Devices in attacks against entities in the Philippines

3 years ago

An alleged China-linked cyberespionage group, tracked as UNC4191, used USB devices in attacks aimed at Philippines entities. Mandiant researchers spotted…

ENC Security, the encryption provider for Sony and Lexar, leaked sensitive data for over a year

3 years ago

CyberNews experts discovered that ENC Security, a Netherlands software company, had been leaking critical business data since May 2021. Original…

Threat actors are offering access to corporate networks via unauthorized Fortinet VPN access

3 years ago

Cyble observed Initial Access Brokers (IABs) offering access to enterprise networks compromised via a critical flaw in Fortinet products. Researchers at…

This website uses cookies.