Technology

Dec 26, 2022Ravie LakshmananReverse Engineering Cybersecurity researchers have exposed a wide variety of techniques adopted by an advanced malware downloader called GuLoader to evade security software. “New shellcode anti-analysis technique attempts to thwart researchers and hostile environments by scanning entire process memory for any virtual machine (VM)-related strings,” CrowdStrike researchers Sarang Sonawane and Donato Onofri
0 Comments
Dec 23, 2022Ravie LakshmananPassword Management / Data Breach The August 2022 security breach of LastPass may have been more severe than previously disclosed by the company. The popular password management service on Thursday revealed that malicious actors obtained a trove of personal information belonging to its customers that include their encrypted password vaults by using
0 Comments
Dec 23, 2022Ravie LakshmananPrivacy / Data Security France’s privacy watchdog has imposed a €60 million ($63.88 million) fine against Microsoft’s Ireland subsidiary for dropping advertising cookies in users’ computers without their explicit consent in violation of data protection laws in the European Union. The Commission nationale de l’informatique et des libertés (CNIL) noted that users
0 Comments
Dec 23, 2022The Hacker NewsIncident Response / XDR Platform Tis the season for security and IT teams to send out that company-wide email: “No, our CEO does NOT want you to buy gift cards.” As much of the workforce signs off for the holidays, hackers are stepping up their game. We’ll no doubt see an
0 Comments
Dec 24, 2022Ravie LakshmananSoftware Security / Supply Chain Threat actors have published yet another round of malicious packages to Python Package Index (PyPI) with the goal of delivering information-stealing malware on compromised developer machines. Interestingly, while the malware goes by a variety of names like ANGEL Stealer, Celestial Stealer, Fade Stealer, Leaf $tealer, PURE Stealer,
0 Comments
Dec 23, 2022Ravie LakshmananCyber Espionage / Pakistani Hackers A new targeted phishing campaign has zoomed in on a two-factor authentication solution called Kavach that’s used by Indian government officials. Cybersecurity firm Securonix dubbed the activity STEPPY#KAVACH, attributing it to a threat actor known as SideCopy based on tactical overlaps with prior attacks. “.LNK files are
0 Comments
Google is reportedly working on making Android’s root store updatable via Google Play Store on Android 14. The search giant’s current mechanism updates root certificates only as part of full system updates, which could potentially render devices running on older Android versions unable to connect to the internet when the expired root certificates not being
0 Comments
Samsung Galaxy S23 series has leaked multiple times in the past. The upcoming flagship smartphone lineup from the South Korean tech brand is believed to include the vanilla Samsung Galaxy S23, Galaxy S23+, and Galaxy S23 Ultra. Now, a new report has surfaced suggesting signature shades of the upcoming Samsung Galaxy S23 series phones. The vanilla
0 Comments
Dec 23, 2022Ravie LakshmananRansomware / Endpoint Security The Vice Society ransomware actors have switched to yet another custom ransomware payload in their recent attacks aimed at a variety of sectors. “This ransomware variant, dubbed ‘PolyVice,’ implements a robust encryption scheme, using NTRUEncrypt and ChaCha20-Poly1305 algorithms,” SentinelOne researcher Antonio Cocomazzi said in an analysis. Vice Society,
0 Comments
An exhaustive analysis of FIN7 has unmasked the cybercrime syndicate’s organizational hierarchy, alongside unraveling its role as an affiliate for mounting ransomware attacks. It has also exposed deeper associations between the group and the larger threat ecosystem comprising the now-defunct ransomware DarkSide, REvil, and LockBit families. The highly active threat group, also known as Carbanak,
0 Comments
Dec 22, 2022Ravie LakshmananInternet of Things / Patch Management The Zerobot DDoS botnet has received substantial updates that expand on its ability to target more internet-connected devices and scale its network. Microsoft Threat Intelligence Center (MSTIC) is tracking the ongoing threat under the moniker DEV-1061, its designation for unknown, emerging, or developing activity clusters. Zerobot,
0 Comments
Redmi K60 series will launch soon in China, Lu Weibing, Redmi’s General Manager, confirmed on Thursday after some initial speculations. The Xiaomi executive did not announce the exact launch date and specifications of the models, but a fresh leak suggests that the latest Redmi K-series phones will go official in China on December 27. The
0 Comments