Iranian hackers have established a new network aimed at targeting U.S. political campaigns.
Cybersecurity researchers have discovered new network infrastructure established by Iranian threat actors to facilitate activities associated with the recent targeting of U.S. political campaigns. The...
Strategies for Reducing SaaS Expenses and Risks While Maintaining Productivity
The primary driver behind the surge in SaaS adoption is productivity. Today, there are specialized tools available for nearly every aspect of modern business, making...
Facebook Ads Direct Users to Fraudulent Websites That Steal Credit Card Information
Facebook users are falling victim to a scam e-commerce network that employs numerous fake websites to steal personal and financial information through brand impersonation and...
New Android Banking Trojan BingoMod Steals Funds and Erases Devices
Cybersecurity researchers have identified a new Android remote access trojan (RAT) named BingoMod that not only conducts unauthorized money transfers from compromised devices but also...
Chinese Hackers Target Japanese Companies with LODEINFO and NOOPDOOR Malware
Japanese organizations have become the target of a Chinese nation-state threat actor utilizing malware families such as LODEINFO and NOOPDOOR to steal sensitive information from...
Malware Linked to North Korea Targets Developers on Windows, Linux, and macOS
The cybercriminals behind an ongoing malware campaign targeting software developers have introduced new malware and tactics, broadening their reach to include Windows, Linux, and macOS...
Hackers Spreading Malicious Python Packages Through Popular Developer Q&A Platform
In yet another indication that cybercriminals are constantly devising new methods to deceive users into downloading malware, it has been revealed that the Q&A platform...
Magento Sites Hit by Stealthy Credit Card Skimmer Using Swap Files
Threat actors have been observed using swap files on compromised websites to conceal a persistent credit card skimmer and steal payment information. This stealthy technique...
A Critical Flaw in Docker Engine Permits Attackers to Circumvent Authorization Plugins
Docker has issued a warning about a critical vulnerability in certain versions of Docker Engine that allows attackers to bypass authorization plugins (AuthZ) under specific...
Mandrake Spyware Resurfaces in Google Play Store Apps After a Two-Year Interval
A new variant of the sophisticated Mandrake spyware has been identified in five apps on the Google Play Store, where it evaded detection for two...