Online Security
1 min read
56

Hackers Tampered With APKPure Store to Distribute Malware Apps

April 10, 2021
0

APKPure, one of the largest alternative app stores outside of the Google Play Store, was infected with malware this week, allowing threat actors to distribute Trojans to Android devices. In an incident that’s similar to that of German telecommunications equipment manufacturer Gigaset, the APKPure client version 3.17.18 is said to

Continue Reading
Online Security
1 min read
50

Alert — There’s A New Malware Out There Snatching Users’ Passwords

April 9, 2021
0

A previously undocumented malware downloader has been spotted in the wild in phishing attacks to deploy credential stealers and other malicious payloads. Dubbed “Saint Bot,” the malware is said to have first appeared on the scene in January 2021, with indications that it’s under active development. “Saint Bot is a

Continue Reading
Online Security
2 min read
56

A Guide to Weathering the Upcoming Vendor Positioning Storm

April 8, 2021
0

April is usually a whirlwind month for the cybersecurity industry as it coincides with the release of the highly regarded and influential MITRE ATT&CK test results. The ATT&CK test measures cybersecurity platforms’ abilities to detect and react to emulated, multistep attacks that can be used as a barometer of platform

Continue Reading
Online Security
1 min read
53

Android to Support Rust Programming Language to Prevent Memory Flaws

April 7, 2021
0

Google on Tuesday announced that its open source version of the Android operating system will add support for Rust programming language in a bid to prevent memory safety bugs. To that end, the company has been building parts of the Android Open Source Project (AOSP) with Rust for the past

Continue Reading
Online Security
1 min read
43

Watch Out! Mission Critical SAP Applications Are Under Active Attack

April 6, 2021
0

Cyber attackers are actively setting their sights on unsecured SAP applications in an attempt to steal information and sabotage critical processes, according to new research. “Observed exploitation could lead in many cases to full control of the unsecured SAP application, bypassing common security and compliance controls, and enabling attackers to

Continue Reading
Online Security
1 min read
52

How the Work-From-Home Shift Impacts SaaS Security

April 5, 2021
0

The data is in. According to IBM Security’s 2020 Cost of a Data Breach Report, there is a 50% increase in cloud usage for enterprises across all industries. The number of threats targeting cloud services, predominantly collaboration services like Office 365, has increased 630%. Moreover, 75% of respondents report that

Continue Reading
Online Security
1 min read
48

533 Million Facebook Users’ Phone Numbers and Personal Data Leaked Online

April 4, 2021
0

In what’s likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been leaked on a popular cybercrime forum for free—which was harvested by hackers in 2019 using a Facebook vulnerability. The leaked data includes full names, Facebook IDs, mobile numbers,

Continue Reading
Online Security
1 min read
46

How Cyrebro Can Unify Multiple Cybersecurity Defenses to Optimize Protection

April 3, 2021
0

Many enterprises rely on more than one security tool to protect their technology assets, devices, and networks. This is particularly true for organizations that use hybrid systems or a combination of cloud and local applications. Likewise, companies whose networks include a multitude of smartphones and IoT devices are likely to

Continue Reading
Online Security
1 min read
48

Chinese Hackers Used Facebook to Hack Uighur Muslims Living Abroad

April 2, 2021
0

Facebook may be banned in China, but the company on Wednesday said it has disrupted a network of bad actors using its platform to target the Uyghur community and lure them into downloading malicious software that would allow surveillance of their devices. “They targeted activists, journalists and dissidents predominantly among

Continue Reading
Online Security
1 min read
42

DeepDotWeb Admin Pleads Guilty to Money Laundering Charges

April 1, 2021
0

The U.S. Department of Justice (DoJ) on Wednesday said that an Israeli national pleaded guilty for his role as an “administrator” of a portal called DeepDotWeb (DDW), a “news” website that “served as a gateway to numerous dark web marketplaces.” According to the unsealed court documents, Tal Prihar, 37, an

Continue Reading
Online Security
2 min read
45

Decided to move on from your NGAV/EDR? A Guide for Small Security Teams to What’s Next

March 31, 2021
0

You’re fully aware of the need to stop threats at the front door and then hunt any that got through that first gate, so your company installed an EPP/ EDR solution. But like most companies, you’ve already come across its shortcoming – and these are amplified since you have a

Continue Reading
Online Security
1 min read
41

MobiKwik Suffers Major Breach — KYC Data of 3.5 Million Users Exposed

March 30, 2021
0

Popular Indian mobile payments service MobiKwik on Monday came under fire after 8.2 terabytes (TB) of data belonging to millions of its users began circulating on the dark web in the aftermath of a major data breach that came to light earlier this month. The leaked data includes sensitive personal

Continue Reading
Online Security
1 min read
37

Flaws in Ovarro TBox RTUs Could Open Industrial Systems to Remote Attacks

March 29, 2021
0

As many as five vulnerabilities have been uncovered in Ovarro’s TBox remote terminal units (RTUs) that, if left unpatched, could open the door for escalating attacks against critical infrastructures, like remote code execution and denial-of-service. “Successful exploitation of these vulnerabilities could result in remote code execution, which may cause a

Continue Reading
Online Security
1 min read
209

Apple Issues Urgent Patch Update for Another Zero‑Day Under Attack

March 28, 2021
0

Merely weeks after releasing out-of-band patches for iOS, iPadOS, macOS and watchOS, Apple has issued yet another security update for iPhone, iPad, and Apple Watch to fix a critical zero-day weakness that it says is being actively exploited in the wild. Tracked as CVE-2021-1879, the vulnerability relates to a WebKit

Continue Reading
Online Security
1 min read
48

Watch Out! That Android System Update May Contain A Powerful Spyware

March 27, 2021
0

Researchers have discovered a new information-stealing trojan, which targets Android devices with an onslaught of data-exfiltration capabilities — from collecting browser searches to recording audio and phone calls. While malware on Android has previously taken the guise of copycat apps, which go under names similar to legitimate pieces of software,

Continue Reading
Online Security
1 min read
37

OpenSSL Releases Patches for 2 High-Severity Security Vulnerabilities

March 26, 2021
0

The maintainers of OpenSSL have released a fix for two high-severity security flaws in its software that could be exploited to carry out denial-of-service (DoS) attacks and bypass certificate verification. Tracked as CVE-2021-3449 and CVE-2021-3450, both the vulnerabilities have been resolved in an update (version OpenSSL 1.1.1k) released on Thursday.

Continue Reading
Online Security
1 min read
51

Black Kingdom Ransomware Hunting Unpatched Microsoft Exchange Servers

March 25, 2021
0

More than a week after Microsoft released a one-click mitigation tool to mitigate cyberattacks targeting on-premises Exchange servers, the company disclosed that patches have been applied to 92% of all internet-facing servers affected by the ProxyLogon vulnerabilities. The development, a 43% improvement from the previous week, caps off a whirlwind

Continue Reading
Online Security
1 min read
57

Purple Fox Rootkit Can Now Spread Itself to Other Windows Computers

March 24, 2021
0

Purple Fox, a Windows malware previously known for infecting machines by using exploit kits and phishing emails, has now added a new technique to its arsenal that gives it worm-like propagation capabilities. The ongoing campaign makes use of a “novel spreading technique via indiscriminate port scanning and exploitation of exposed

Continue Reading