Category: Information Security

APT42

Beware: APT42 Cyber Spies Target the West

The cyberespionage group APT42 employs social engineering to infiltrate corporate networks and cloud environments in the West and the Middle East. Mandiant, which first documented the group’s activities in September 2022, reports that APT42...

Android 14 Garmin Response

VPN “Kill Switch” Broken on Android

Android users have encountered DNS leak issues when switching VPN servers, despite having “Always On VPN” and “Block Connections Without VPN” features enabled. This problem, identified in the latest version of Android 14, was...

Android devices malware

Finland Faces Bank Hacking Surge: Watch Out!

In Finland, cybercriminals have intensified their efforts, deploying malicious Android applications aimed at hacking bank accounts, as warned by the local Finnish Transport and Communications Agency (Traficom). These fraudsters are sending SMS messages in...

Microsoft Graph API Cybercriminals

Cybercriminals Hijack Microsoft API for Attacks

Cybercriminals are increasingly harnessing Microsoft Graph API to manage malicious software and evade detection systems. According to researchers from Symantec, such actions are designed to facilitate communication with C2 infrastructure hosted on Microsoft’s cloud...

CVE-2024-26304

ArubaOS: 4 Critical Flaws Allow Full System Takeover

Recently, Aruba Networks, a subsidiary of Hewlett Packard Enterprise (HPE), disclosed information about ten vulnerabilities in its ArubaOS operating system, four of which are classified as critical. These vulnerabilities could potentially allow arbitrary code...

Indonesia spyware

Indonesia Caught Spying: Secret Spyware Deal Exposed

According to Amnesty International, Indonesia has been covertly acquiring spyware through a complex network of intermediaries spanning from Israel to Greece, Singapore, and Malaysia. The organization asserts that its investigation has uncovered a systemic...

path traversal vulnerabilities

Hackers Exploit Path Traversal: Prevent Pre-Release Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have urged software developers to more proactively identify and remedy path traversal vulnerabilities before releasing products to the market. Such...

Dirty Stream

Android Apps Vulnerable to “Dirty Stream” Attacks

Microsoft has issued a warning to Android users about a new exploit dubbed “Dirty Stream,” which allows malicious applications to overwrite files in another application’s home directory, potentially leading to arbitrary code execution and...

TargetCompany ransomware

MSQL Server Breaches Linked to Mallox Ransomware

Cybersecurity experts from the ASEC laboratory have uncovered a series of sophisticated cyberattacks targeting Microsoft SQL Servers (MS-SQL). The group known as TargetCompany is deploying the Mallox ransomware to encrypt systems and extort victims....