Cybersecurity Blog
Chameleon Android Banking Trojan Targets Users Through Fake CRM App
Cybersecurity researchers have lifted the lid on a new technique adopted by threat actors behind the Chameleon Android ...
Apple’s New macOS Sequoia Tightens Gatekeeper Controls to Block Unauthorized Software
Apple on Tuesday announced an update to its next-generation macOS version that makes it a little more difficult for ...
INTERPOL Recovers $41 Million in Largest Ever BEC Scam in Singapore
INTERPOL said it devised a “global stop-payment mechanism” that helped facilitate the largest-ever recovery ...
Bloody Wolf Strikes Organizations in Kazakhstan with STRRAT Commercial Malware
The STRRAT malware, sold for $80, allows attackers to take control of computers and steal data. Attackers use phishing ...
Sneaky SnakeKeylogger Slithers Into Windows Email Inboxes
SnakeKeylogger, also known as KrakenKeylogger, is a malicious software targeting Windows users. It logs keystrokes, ...
North Korean Hackers Exploit VPN Update Flaw to Install Malware
North Korean hackers exploited a VPN software update flaw to install malware and breach networks, as warned by South ...
Cyberattack Cost More Than $17 Million, Key Tronic Tells Regulators
Key Tronic revealed to regulators that a cyberattack in May 2024 cost the company over $17 million. The attack led to a ...
Ransomware Gang Targets IT Workers With New SharpRhino Malware
The Hunters International ransomware group is using a new C# remote access trojan named SharpRhino to target IT workers ...