admin

Jan 08, 2023Ravie LakshmananCyberespionage / Threat Analysis The Russian cyberespionage group known as Turla has been observed piggybacking on attack infrastructure used by a decade-old malware to deliver its own reconnaissance and backdoor tools to targets in Ukraine. Google-owned Mandiant, which is tracking the operation under the uncategorized cluster moniker UNC4210, said the hijacked servers
0 Comments
Hackers stole the email addresses of more than 200 million Twitter users and posted them on an online hacking forum, a security researcher said Wednesday. The breach “will unfortunately lead to a lot of hacking, targeted phishing and doxxing,” Alon Gal, co-founder of Israeli cybersecurity-monitoring firm Hudson Rock, wrote on LinkedIn. He called it “one
0 Comments
Jan 05, 2023Ravie LakshmananMobile Security / Surveillance Financial institutions are being targeted by a new version of Android malware called SpyNote at least since October 2022 that combines both spyware and banking trojan characteristics. “The reason behind this increase is that the developer of the spyware, who was previously selling it to other actors, made
0 Comments
Jan 06, 2023Ravie LakshmananOnline Safety / Privacy Popular instant messaging service WhatsApp has launched support for proxy servers in the latest version of its Android and iOS apps, letting users circumvent government-imposed censorship and internet shutdowns. “Choosing a proxy enables you to connect to WhatsApp through servers set up by volunteers and organizations around the
0 Comments
France’s privacy watchdog CNIL on Wednesday said it had imposed a EUR 8 million (roughly Rs. 70 crore) fine linked to ad personalisation in the iPhone maker’s App Store, citing shortcomings with regard to user consent. “The advertising targeting settings available from the “Settings” icon of the iPhone were pre-checked by default”, the CNIL said in
0 Comments
Jan 06, 2023Ravie LakshmananEndpoint Security/ Malware A variant of the infamous Dridex banking malware has set its sights on Apple’s macOS operating system using a previously undocumented infection method, according to latest research. It has “adopted a new technique to deliver documents embedded with malicious macros to users without having to pretend to be invoices
0 Comments