Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims’ banking credentials. “The mechanisms include using malformed ZIP files in combination with JSONPacker,” Cleafy security researchers Michele Roviello and Alessandro Strino said. “In addition, […]
Category Archives: Uncategorized
Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this problem resolves over 80% of your corporate risk, and a solution is possible. However, most tools available on the market today cannot offer a complete defense against this attack vector because they […]
Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks. The activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS score: 9.8) by security researcher Sina Kheirkhah of […]
Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency mining. The activity, which specifically singles out the Oracle Weblogic server, is designed to deliver malware dubbed Hadooken, according to cloud security firm Aqua. “When Hadooken is executed, it drops a Tsunami malware and deploys a crypto miner,” security researcher […]
Their findings highlight the frailty of some of the mechanisms for establishing trust on the Internet. Go to Source Author: Jai Vijayan, Contributing Writer
An attacker is using the tool to deploy a cryptominer and the Tsunami DDoS bot on compromised systems. Go to Source Author: Jai Vijayan, Contributing Writer
A technique to abuse Microsoft’s built-in source code editor has finally made it into the wild, thanks to China’s Mustang Panda APT. Go to Source Author: Nate Nelson, Contributing Writer
The dangerous ransomware group is targeting financial and insurance sectors using smishing and vishing against IT service desk administrators, cybersecurity teams, and other employees with top-level privileges. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Law enforcement seized electronics containing special hacking tools and software as well as a substantial amount of cash in the raids. Go to Source Author: Dark Reading Staff
