Category: Information Security

Brokewell

Fake Chrome Update Hides Android Brokewell Spyware

ThreatFabric has identified a new malicious application named Brokewell, capable of recording every action on a device, from keystrokes to text input and application launches. The Trojan is distributed through a counterfeit Google Chrome...

CVE-2024-20353

Cisco Zero-Days Exploited in State-Sponsored Breach

Network security measures such as firewalls are designed to safeguard corporate networks from breaches. However, it turns out that cybercriminals are increasingly turning these systems against their owners, using them as springboards to infiltrate...

CVE-2024-2389

Critical Alert: Flowmon Exploit Puts 1,500+ Firms at Risk

Security experts have identified a critical vulnerability in the Flowmon network performance monitoring tool from Progress Software, utilized by over 1,500 companies globally, including major organizations such as SEGA, KIA, and Volkswagen. The vulnerability...

keyboard vulnerabilities

Millions at Risk: Popular Keyboard Apps Leak Keystrokes (

Experts at Citizen Lab have identified vulnerabilities in popular keyboard applications that could be exploited to log keystrokes of Chinese users worldwide. These security issues are nearly ubiquitous across apps, including those pre-installed on...

Nespresso Phishing Attack

Phishing Attack Lurks in Nespresso Domain

Cybersecurity researchers from Perception Point recently discovered a vulnerability on the Nespresso coffee machine and capsule manufacturer’s website, which scammers actively exploit to redirect users to malicious sites. The vulnerability, related to open redirection,...

Dependency Confusion Vulnerability

Dependency Confusion Flaw Found in Old Apache Code

Recently, security researchers identified a new vulnerability known as Dependency Confusion, affecting an archived Apache project titled Cordova App Harness. This vulnerability enables malefactors to manipulate package managers into downloading a fraudulent package from...

GuptiMiner

eScan Update Delivers Backdoors & Cryptominers

North Korean hackers exploited the eScan antivirus update mechanism to embed backdoors into corporate networks and disseminate cryptocurrency miners using the malicious software, GuptiMiner. Cybersecurity firm Avast reports that the perpetrators conducted an adversary-in-the-middle...

Lazarus Group

North Korea Targets S.Korean Defense Tech

The South Korean police have issued a warning about cyberattacks by North Korean hacker groups targeting defense industry enterprises to steal valuable technological information. The police have documented several instances of successful breaches of...

cyberattacks targeting U.S. government

Iran Cyberwarfare Targets US: Sanctions Issued

The United States Treasury Department has announced the imposition of sanctions against four Iranian citizens and two corporations for their involvement in cyberattacks targeting U.S. government agencies, defense contractors, and private companies. The sanctions...

malicious package Discord

PyPI Package Exposed: Fortinet Warns of Discord Data Theft

Cybersecurity experts from Fortinet have identified a new malicious package in the PyPI registry for developers, aimed at stealing user data from Discord. The package, named “discordpy_bypass-1.7,” was published on March 10, 2024, and...