A new Android malware has been discovered hidden inside trojanized versions of the Alpine Quest mapping app, which is reportedly used by Russian soldiers as part of war zone operational planning. […] Go to Source Author: Bill Toulas
Category Archives: Security
WhatsApp has introduced a new Advanced Chat Privacy feature to protect sensitive information exchanged in private chats and group conversations. […] Go to Source Author: Sergiu Gatlan
Blue Shield of California disclosed it suffered a data breach after exposing protected health information of 4.7 million members to Google’s analytics and advertisement platforms. […] Go to Source Author: Bill Toulas
The FBI says cybercriminals have stolen a record $16,6 billion in 2024, marking an increase in losses of over 33% compared to the previous year. […] Go to Source Author: Sergiu Gatlan
ASUS has released security updates to address CVE-2024-54085, a maximum severity flaw that could allow attackers to hijack and potentially brick servers. […] Go to Source Author: Bill Toulas
Phishing attacks now evade email filters, proxies, and MFA — making every attack feel like a zero-day. This article from Push Security breaks down why detection is failing and how real-time, in-browser analysis can help turn the tide. […] Go to Source Author: Sponsored by Push Security
Marks & Spencer (M&S) has disclosed that it is responding to a cyberattack over the past few days that has impacted operations, including its Click and Collect service. […] Go to Source Author: Lawrence Abrams
An Active! Mail zero-day remote code execution vulnerability is actively exploited in attacks on large organizations in Japan. […] Go to Source Author: Bill Toulas
A hacking group dubbed ‘Elusive Comet’ targets cryptocurrency users in social engineering attacks that exploit Zoom’s remote control feature to trick users into granting them access to their machines. […] Go to Source Author: Bill Toulas
South Korea’s largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related information for customers. […] Go to Source Author: Bill Toulas
