Share this blog Research by Aazim Bill SE Yaswant and Vishnu Pratapagiri In July 2023, it was discovered that an Android mobile campaign, which consisted of banking trojans, was targeting major Iranian banks. Zimperium’s research team recently found that the campaign not only remains active but also extended its capabilities. These newly found samples are completely undetected by […]
Key takeaways From July through October 2023, Proofpoint researchers observed TA402 engage in phishing campaigns that delivered a new initial access downloader dubbed IronWind. The downloader was followed by additional stages that consisted of downloaded shellcode. During the same period, TA402 adjusted its delivery methods, moving from using Dropbox links to using XLL and RAR […]
In July, a security anomaly surfaced when atypical commits, disguised as Dependabot contributions, were detected in numerous GitHub repositories. On closer examination, these commits were found to harbor malicious code, raising serious concerns within the developer community. Diving into Details Threat actors meticulously fabricated commit messages to mimic Dependabot’s automated contributions to mask the malevolent […]
Technology company Microsoft has revealed that it suffered a data leak in July 2020 which exposed 38 terabytes of private employee data. News of the leak was made public via a blog post on September 18. In it, Microsoft explained that the leak was caused by a software misconfiguration. The company shared that the misconfiguration […]
In July 2022, crypto lender Celsius filed for bankruptcy and froze withdrawals from user accounts. Customers have since filed claims against the company, hoping to recover a portion of the funds.
Last updated 24 July, 2023 I recently taught my 10-year-old daughter to DJ, and she played for nearly three hours at two school parties, after only a few weeks of practising. You can read all about our experience here, but in this article, I am going to distil what I learned down to seven easy […]