Cybersecurity

Rhadamanthys Malware Deployed By TA547 Against German Targets

The threat actor TA547 has been observed targeting German organizations with the known stealer Rhadamanthys. According to a recent report from Proofpoint, this is the first time this threat actor has been associated with such activity.  What’s particularly intriguing according to the researchers is the actor’s apparent employment of a PowerShell script likely generated by […]

Cybersecurity

New Google Workspace feature prevents sensitive security changes if two admins don’t approve them – Help Net Security

Google is rolling out multi-party approvals for Google Workspace customers with multiple super admin accounts, the company has announced. What does the feature do? Google Workspace (formerly G Suite) is a cloud-based set of productivity and collaboration tools/services aimed at enterprise audiences. The (optional) multi-party approvals feature is one of many that were announced by […]

Cybersecurity

Researchers discover new ransomware gang ‘Muliaka’ attacking Russian businesses

A previously unknown ransomware gang has been attacking Russian businesses with malware based on the leaked source code from the Conti hacking group. The gang, which researchers at the Moscow-based cybersecurity company F.A.C.C.T. have dubbed “Muliaka,” or Muddy Water in English, has left minimal traces from its attacks but has likely been active since at […]

DJing

1010 Music Nanobox Tangerine review | Juno Daily

The latest in 1010’s Nanobox series is a versatile ‘streaming sampler’ groove box, with an emphasis on multi-sampling instruments. Greg Scarth puts it to the test. The fourth release in the brand’s compact groovebox series, the 1010 Music Nanobox Tangerine is the latest in an exciting series of hardware devices. Described as a ‘streaming sampler’, […]

Cybersecurity

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. “Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads […]