Cybersecurity

SecuriDropper: New Android Dropper-as-a-Service Bypasses Google’s Defenses

Nov 06, 2023NewsroomMobile Security / Malware Cybersecurity researchers have shed light on a new dropper-as-a-service (DaaS) for Android called SecuriDropper that bypasses new security restrictions imposed by Google and delivers the malware. Dropper malware on Android is designed to function as a conduit to install a payload on a compromised device, making it a lucrative […]

Cybersecurity

Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel

Nov 06, 2023NewsroomCyber Attack / Online Security Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host command-and-control (C2) infrastructure. The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June […]

Cybersecurity

Google Play Store Highlights ‘Independent Security Review’ Badge for VPN Apps

Nov 04, 2023NewsroomMobile Security / Android Google is rolling out a new banner to highlight the “Independent security review” badge in the Play Store’s Data safety section for Android VPN apps that have undergone a Mobile Application Security Assessment (MASA) audit. “We’ve launched this banner beginning with VPN apps due to the sensitive and significant […]

Cybersecurity

Iranian Hackers Launches Destructive Cyberattacks on Israeli Tech and Education Sectors

Nov 06, 2023NewsroomCyber War / Malware Israeli higher education and tech sectors have been targeted as part of a series of destructive cyber attacks that commenced in January 2023 with an aim to deploy previously undocumented wiper malware. The intrusions, which took place as recently as October, have been attributed to an Iranian nation-state hacking […]

Cybersecurity

Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel

Nov 06, 2023NewsroomCyber Attack / Online Security Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host command-and-control (C2) infrastructure. The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June […]

Cybersecurity

U.S. Treasury Sanctions Russian Money Launderer in Cybercrime Crackdown

Nov 06, 2023Newsroom The U.S. Department of the Treasury imposed sanctions against a Russian woman for taking part in the laundering of virtual currency for the country’s elites and cybercriminal crews, including the Ryuk ransomware group. Ekaterina Zhdanova, per the department, is said to have facilitated large cross border transactions to assist Russian individuals to […]

Cybersecurity

Okta’s Recent Customer Support Data Breach Impacted 134 Customers

Nov 04, 2023NewsroomData Breach / Cyber Attack Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach affected 134 of its 18,400 customers. It further noted that the unauthorized intruder gained access to its systems from September 28 to October 17, 2023, and ultimately accessed HAR files containing […]

Cybersecurity

Google Play Store Introduces ‘Independent Security Review’ Badge for Apps

Nov 04, 2023NewsroomMobile Security / Android Google is rolling out an “Independent security review” badge in the Play Store’s Data safety section for Android apps that have undergone a Mobile Application Security Assessment (MASA) audit. “We’ve launched this banner beginning with VPN apps due to the sensitive and significant amount of user data these apps […]

Cybersecurity

Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud Environments

Nov 03, 2023NewsroomCloud Security / Linux The threat actors linked to Kinsing have been observed attempting to exploit the recently disclosed Linux privilege escalation flaw called Looney Tunables as part of a “new experimental campaign” designed to breach cloud environments. “Intriguingly, the attacker is also broadening the horizons of their cloud-native attacks by extracting credentials […]