Cybersecurity

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

Several public and popular libraries abandoned but still used in Java and Android applications have been found susceptible to a new software supply chain attack method called MavenGate. “Access to projects can be hijacked through domain name purchases and since most default build configurations are vulnerable, it would be difficult or even impossible to know […]

Cybersecurity

DDoS Barrage Hits Monobank, Ukraine’s Largest Mobile Bank, in Unprecedented Attack

Monobank, Ukraine’s largest mobile-only bank, faced a barrage of denial of service (DDoS) attacks on January 21, crippling its operations and causing widespread disruption. Co-founder and CEO Oleh Horokhovskyi took to Telegram to confirm the Monobank cyberattack, revealing that the bank was targeted with a staggering 580 million service requests in one of the attacks. […]

Cybersecurity

Zloader: No Longer Silent in the Night

Technical Analysis In the following sections, we dive into the technical details surrounding Zloader’s new updates to their anti-analysis techniques, embedded configuration, DGA, and network encryption. Anti-analysis techniques Zloader uses a combination of API import hashing, junk code, a filename check, and string obfuscation. The following sections analyze each technique. Imports and API resolution The […]

Cybersecurity

Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web

Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web Pierluigi Paganini January 22, 2024 Resecurity researchers warn of massive leak of stolen Thai personally identifiable information (PII) on the dark web by cybercriminals. Resecurity has detected a noticeable increase in data leaks from consumer-focused platforms in Thailand, confirming that threat actors […]