Technology

In yet another indicator of how hacking groups are quick to capitalize on world events and improvise their attack campaigns for maximum impact, threat actors have been discovered impersonating Amnesty International to distribute malware that purports to be security software designed to safeguard against NSO Group’s Pegasus surveillanceware. “Adversaries have set up a phony website
0 Comments
Cybersecurity researchers have disclosed an unpatched security vulnerability in the protocol used by Microsoft Azure Active Directory that potential adversaries could abuse to stage undetected brute-force attacks. “This flaw allows threat actors to perform single-factor brute-force attacks against Azure Active Directory (Azure AD) without generating sign-in events in the targeted organization’s tenant,” researchers from Secureworks
0 Comments
Facebook on Wednesday announced it’s open-sourcing Mariana Trench, an Android-focused static analysis platform the company uses to detect and prevent security and privacy bugs in applications created for the mobile operating system at scale. “[Mariana Trench] is designed to be able to scan large mobile codebases and flag potential issues on pull requests before they
0 Comments
Google Search is getting smarter by deploying the proprietary Multitask Unified Model (MUM). At the Search On event on Wednesday, the Mountain View, California-based company announced a series of updates coming to Google Search that will leverage MUM to enhance user experience. Google is also bringing a redesigned Search page for users where it will
0 Comments
Two newly discovered malicious Android applications on Google Play Store have been used to target users of Brazil’s instant payment ecosystem in a likely attempt to lure victims into fraudulently transferring their entire account balances into another bank account under cybercriminals’ control. “The attackers distributed two different variants of banking malware, named PixStealer and MalRhino,
0 Comments
Opportunistic threat actors have been found actively exploiting a recently disclosed critical security flaw in Atlassian Confluence deployments across Windows and Linux to deploy web shells that result in the execution of crypto miners on compromised systems. Tracked as CVE-2021-26084 (CVSS score: 9.8), the vulnerability concerns an OGNL (Object-Graph Navigation Language) injection flaw that could
0 Comments
Flipkart Big Billion Days 2021 sale is set to begin on October 3 and will be live till October 10. The eight-day event will be the year’s biggest sale by the Walmart-owned e-commerce website. Many brands including Blaupunkt, Infinix, and Thomson have announced big discounts on their smart TV lineups that will be live during the
0 Comments
A new advanced trojan sold on Russian-speaking underground forums comes with capabilities to steal users’ accounts on popular online video game distribution services, including Steam, Epic Games Store, and EA Origin, underscoring a growing threat to the lucrative gaming market. Cybersecurity firm Kaspersky, which coined the malware “BloodyStealer,” said it first detected the malicious tool
0 Comments
OnePlus 9 Pro phone was reportedly spotted running Android 12-based ColorOS 12, replacing OxygenOS. After OnePlus and Oppo announced their merger, smartphones from OnePlus will be receiving a new unified operating system from 2022. However, it seems that the OnePlus 9 Pro unit was running a beta test version of the ColorOS 12 update, as
0 Comments
State-sponsored hackers affiliated with Russia are behind a new series of intrusions using a previously undocumented implant to compromise systems in the U.S., Germany, and Afghanistan. Cisco Talos attributed the attacks to the Turla advanced persistent threat (APT) group, coining the malware “TinyTurla” for its limited functionality and efficient coding style that allows it to
0 Comments
Oppo A95 4G has bagged multiple certifications that indicates its launch could be around the corner. The upcoming Oppo smartphone was recently spotted in Thailand’s National Broadcasting and Telecommunications Commission (NBTC) listing with the model number CPH2365. The Oppo A95 4G handset has also reportedly received the US Federal Communications Commission (FCC) certification, which also
0 Comments
Cybersecurity researchers have charted the evolution of Jupyter, a .NET infostealer known for singling out healthcare and education sectors, which make it exceptional at defeating most endpoint security scanning solutions. The new delivery chain, spotted by Morphisec on September 8, underscores that the malware has not just continued to remain active but also showcases “how
0 Comments