360 Qihoo reported DDoS attacks launched by APT-C-53 (aka Gamaredon) conducted through the open-source DDoS Trojan program LOIC.
Researchers at 360 Qihoo observed a wave of DDoS attacks launched by Russia-linked APT-C-53 (aka Gamaredon) and reported that the threat actors also released as open-source the code of a DDoS Trojan called LOIC. The instances o
The recently launched Industrial Spy data extortion marketplace has now started its ransomware operation.
In April, Malware HunterTeam and Bleeping Computer reported the launch of a new dark web marketplace called Industrial Spy that sells stolen data and offers free stolen data to its members. MalwareHunterTeam researchers spotted malware samples [1, 2]
Russia-linked threat actors are behind a new website that published leaked emails from leading proponents of Britain’s exit from the EU, the Reuters reported.
According to a Google cybersecurity official and the former head of UK foreign intelligence, the “Very English Coop d’Etat” website was set up to publish private emails from
Microsoft found several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps.
The Microsoft 365 Defender Research Team discovered four vulnerabilities (CVE-2021-42598, CVE-2021-42599, CVE-2021-42600, and CVE-2021-42601) in a mobile framework, owned by mce Systems, that is used by several mobile carri
Security researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals.
A team of researchers from Zhejiang University and Technical University of Darmstadt devised a technique, dubbed GhostTouch, to remotely control capacitive touchscreens using electromagnetic signals.
According to the experts, Gho
The FBI warns organizations in the higher education sector of credentials sold on cybercrime forums that can allow threat actors to access their networks.
The FBI issued an alert to inform the higher education sector about the availability of login credentials on dark web forums that can be used by threat actors to launch attacks against individuals and o
A new version of the ERMAC Android banking trojan is able to target an increased number of apps.
The ERMAC Android banking trojan version 2.0 can target an increasing number of applications, passing from 378 to 467 target applications to steal account credentials and crypto-wallets.
ERMAC was first spotted by researchers from Threatfabric in July 2021,
Security researchers released PoC exploit code for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products.
Horizon3 security researchers have released a proof-of-concept (PoC) exploit and technical analysis for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products.
Zyxel addressed multiple vulnerabilities impacting many of its products, including APs, AP controllers, and firewalls.
Zyxel has released security updates to address multiple vulnerabilities affecting multiple products, including firewall, AP, and AP controller products.
Below is the list of the four vulnerabilities, the most severe one is a command in
An investigation of the infamous “Is That You?” video scam led Cybernews researchers into exposing threat actors who are poisoning Facebook
Original post @ https://cybernews.com/security/exposed-the-threat-actors-who-are-poisoning-facebook/
An investigation of the infamous “Is That You?” video scam has led Cybernews researchers to a cybercriminal stron
Researchers warn of a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims’ browsers.
Researchers from Red Canary observed a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims’ browsers.
ChromeLoader is a malicious Chrome browser extension, it is classified as a pervasive b
Italy announced its National Cybersecurity Strategy for 2022/26, a crucial document to address cyber threats and increase the resilience of the country.
Italy presented its National Cybersecurity Strategy for 2022/26 and reinforce the government’s commitment to addressing cyber threats and increasing the resilience of the country to cyber attacks.
The maintainers of the Tails project (The Amnesic Incognito Live System) warn users that the Tor Browser bundled with the OS could expose their sensitive information.
The maintainers confirmed that Tor Browser in Tails 5.0 and earlier is unsafe to use for sensitive information.
“We recommend that you stop using Tails until the release of 5.1 (Ma
An unknown APT group is targeting Russian government entities since the beginning of the Russian invasion of Ukraine.
Researchers from Malwarebytes observed an unknown Advanced Persistent Threat (APT) group targeting Russian government entities with at least four separate spear-phishing campaigns since the beginning of the Russian invasion of Ukraine.
The Nigeria Police Force has arrested the suspected leader of the SilverTerrier cybercrime group as a result of an international operation.
The Nigeria Police Force has arrested the suspected leader of the SilverTerrier cybercrime gang (aka TMT) after a year-long investigation codenamed “Operation Delilah.” SilverTerrier has been active since
Announce
Share high-quality web security related articles with you:)