Trend Micro conducted an investigation into a malicious Android malware sample, which is believed to be linked to the StrongPity APT group, that was posted on the Syrian e-Gov website.
The malware listens for incoming connections from C2 servers and provides screen and camera access, directory listing, file lookup, file upload, shell command execution, and other capabilities.
Cybersecurity researchers on Wednesday disclosed details of an evolving malware that has now been upgraded to steal sensitive information from Apple’s macOS operating system.
Seven vulnerabilities have been addressed in Adobe After Effects for Windows and macOS. Five of them can allow arbitrary code execution and they have been rated critical.
Fortinet released updates for FortiManager and FortiAnalyzer network management solutions to fix a serious vulnerability that could be exploited to execute arbitrary code with the highest privileges.
Google discovered four zero-day vulnerabilities existing in popular web browsers such as Chrome, Safari, and Internet Explorer. State-sponsored threat groups were observed exploiting these flaws in separate campaigns. Today, nation-state cybercriminals appear more interested in finding and exploiting new zero-day vulnerabilities than ever.
An analysis of criminal forums, where experts studied 15 cybercrime forums from January 2020 to March 2021, reveals attackers’ top favorite CVEs. As per them, most of the discovered CVEs were exploited by nation-state hackers and cybercriminals. At the least, organizations must locate these flaws and help security professionals identify the potential areas of threats […]
SentinelLabs has discovered a high severity flaw in HP, Samsung, and Xerox printer drivers. Since 2005 HP, Samsung, and Xerox have released millions of printers worldwide with the vulnerable driver.
As per The Guardian, the leaked database at the heart of the Pegasus project includes the mobile phone numbers of the French president, Emmanuel Macron, and 13 other heads of state and heads of government.
Recent attacks for which the U.S. accused China were highly aggressive, and they reveal that China has transformed into a far more sophisticated and mature cyber adversary than a decade ago.