In 2021, 30% of known zero-day vulnerabilities targeted mobile devices, while there was a 466% rise in exploited zero-day vulnerabilities against mobile endpoints, according to Zimperium.
The recent leak of Conti source code, chat logs, and other sensitive records have unfolded several secrets of the group. Different researchers studied the findings and laid down their analysis. According to Chainanysis, Conti extorted an estimated $180m last year, making it the top gainer for ransomware operations in 2021. The recent leak of Conti […]
These conversation hijacking attacks have the potential to be more effective because the source of the email is someone the victim trusts and the message comes as part of an ongoing thread.
In a new report by email security firm Cofense, researchers have spotted multiple phishing campaigns impersonating the Internet Revenue Service (IRS.gov) that use lures related to the 2022 U.S. tax season.
The critical flaw, tracked as CVE-2022-0971, has been described as a use-after-free issue affecting the Blink Layout component. Sergei Glazunov of Google Project Zero has been credited for reporting the flaw.
Large-scale phishing activity using hundreds of domains to steal credentials for Naver, a Google-like online platform in South Korea, shows infrastructure overlaps linked to the TrickBot botnet.
BlackBerry Threat Intelligence has identified a new Raas family, and tracked its lineage to its probable beta stage release. LokiLocker encrypts your files and will render your machine unusable if you don’t pay up in time.
The FTC accused the company of inadequately securing user data and ignoring known security threats, failures which led to a February 2019 breach in which a hacker accessed millions of email addresses and passwords.
The FBI says Russian state-backed hackers gained access to an NGO cloud after enrolling their own device in the organization’s Duo MFA following the exploitation of misconfigured default MFA protocols.
The credential-stealing Raccoon Stealer is spotted using the chat app to store and update C2 addresses as adversaries find creative new ways to distribute the malware. The cybercriminals are attempting to evade detection by packing the credential stealer, using Themida or malware packers. Experts think that the developers of this malware will continue to add new […]