Some doorbell cameras sold by Amazon and other online retailers have security flaws that could allow bad actors to view footage from the devices or control them completely, according to an investigation published Thursday by Consumer Reports. Researchers from the product-review organization said the…
Category: Cyber Security News
A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other products to Meta as part of the social media giant’s ongoing litigation against the Israeli spyware vendor.
The decision, which marks a major legal victory for Meta, which filed the lawsuit in October 2019 for using its infrastructure to distribute the spyware to approximately
Lack of AI model visibility and security puts the software supply chain security problem on steroids.
A sophisticated threat actor using an MO similar to Scattered Spider is camouflaging itself with convincing impersonation techniques in targeted attacks.
The better a security team works together, the bigger the direct impact on how well it can protect the organization.
Convincing phishing emails, synthetic identities, and deepfakes all have been spotted in cyberattacks on the continent.
A new Linux variant of the Bifrost remote access trojan (RAT) employs several novel evasion techniques, including the use of a deceptive domain that was made to appear as part of VMware. […]
Applications are increasingly distributed, expanding companies’ cloud attack surfaces and requiring regular testing to find and fix vulnerabilities โ and avoid the risk of a growing sprawl of services.
Brave Software is the next company to jump into AI, announcing a new privacy-preserving AI assistant called “Leo” is rolling out on the Android version of its browser through the latest release, version 1.63. […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed today that attackers who hack Ivanti VPN appliances using one of multiple actively exploited vulnerabilities may be able to maintain root persistence even after performing factory resets. […]
In today’s digital era, data privacy isn’t just a concern; it’s a consumer demand. Businesses are grappling with the dual challenge of leveraging customer data for personalized experiences while navigating a maze of privacy regulations. The answer? A privacy-compliant Customer Data Platform (CDP).
Join us for a transformative webinar where we unveil Twilio Segment’s state-of-the-art CDP.
An “intricately designed” remote access trojan (RAT) calledย Xeno RATย has been made available on GitHub, making it available to other actors at no extra cost. Written in C# and compatible with Windows 10 and Windows 11 operating systems, the open-source RAT comes with a “comprehensive set of features…
More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation and click monetization.
Guardio Labs is tracking the coordinated malicious activity, which has been ongoing since at least September 2022, under the name SubdoMailing. The emails range from “counterfeit
This report details statistics and key trends associated with mobile malware: Google Play Trojans, malicious messaging app mods, and others.
By Dylan DuncanCofense Intelligence is tracking an advanced campaign that is successfully reaching intended targets in the Oil and Gas industry. The campaign delivers an uncommon, but advanced, Malware-as-a-Service information stealer, the Rhadamanthys Stealer. This new and advanced phishing campaig…