The pentester's Swiss knife

malicious LumiApps SDK

28 Android VPNs Found to be Secret Proxies

Twenty-eight free VPN applications on Google Play were found to employ a malicious SDK, transforming Android devices into residential proxies, likely utilized for cybercrimes and bot operations. The team at HUMAN discovered that these...

Xbox Game Pass keyboard

Xbox Game Pass: Keyboard & Mouse Support Arrives in Testing

Following previous indications that cloud streaming games included in the Xbox Game Pass subscription service would receive updates to support keyboard and mouse inputs, Microsoft has finally commenced testing this feature within the Alpha...

APT41 hacker

UK and US Accuse China of Election Hacking

On March 25th, the United Kingdom and the United States formally accused China of cyberattacks on democratic institutions, linking Chinese intelligence services to incidents at the Electoral Commission in 2021 and attempting to hack...

Windows ARM Chrome

Say Goodbye to Lag: Chrome Update Tailored for Snapdragon

Google and Qualcomm have announced the introduction of a Chrome browser optimized for Arm architecture Windows PCs equipped with Snapdragon processors, promising an enhanced browsing experience. This refinement is set to elevate the user...

MuddyWater

MuddyWater Phishing: Atera Used to Spy on Israel

The cybersecurity firm Proofpoint has uncovered a new phishing campaign orchestrated by the Iranian faction MuddyWater. This operation disseminates legitimate remote monitoring and management software, Atera, among Israeli organizations within the global manufacturing, technology,...

UNC5174

UNC5174 Exploits Zero-Days: F5, Connectwise Hit

Mandiant specialists report that Chinese hackers, identified as UNC5174, are exploiting vulnerabilities in widely-used products to disseminate malicious software capable of installing additional backdoors on compromised Linux hosts. The attacks orchestrated by UNC5174 have...

Sign1 Malware

Massive Sign1 Malware Campaign Targets WordPress

Over the last six months, tens of thousands of web resources have fallen victim to a large-scale campaign deploying the previously unknown malicious program Sign1. Perpetrators have been embedding this malware into WordPress sites,...

CVE-2023-48788 PoC

Fortinet Vulnerability Exploited: Patch Now! PoC Published

Security researchers at Horizon3 have disclosed a Proof-of-Concept (PoC) exploit for a critical vulnerability in Fortinet’s FortiClient EMS, which is currently being actively exploited by hackers. The SQL injection vulnerability, CVE-2023-48788 (with a CVSS...

Unsaflok

Unsafe Hotels? Millions of Rooms Vulnerable to Attack

Annually in August, thousands of cybersecurity professionals gather in Las Vegas for an event often dubbed the “hackers’ summer camp.” This period marks the convening of two of the largest information security conferences: Black...

TinyTurla-NG

NGO Targeted: UNC4210 Deploys TinyTurla-NG

The cybercrime collective known as UNC4210 orchestrated an assault on the digital infrastructure of a European non-governmental organization, deploying the malign software TinyTurla-NG to establish a backdoor. This cyberattack was meticulously documented in a...