Attackers are relentlessly attacking targets with ransom notes and manipulating the stock price of targeted companies. These notes were part of a string_of_text directed…
General
A raft of APC Smart-UPS devices vulnerable to attacks
Armis researchers have found three vulnerabilities in APC Smart-UPS devices; they call the vulnerabilities collectively TLStorm. APC stated it had sold more than 20…
Amazon’s Echo smart speakers can be hacked to issue self-commands
Academic researchers have uncovered a vulnerability in Amazon Echo smart speakers, which can be used to hack it. The hacker can use the speaker…
SharkBot malware spreading through fake antivirus app on Google Play store
Threat actors have used antivirus as their banking trojan cover to avoid detection by Google Play. The banking trojan is called SharkBot. SharkBot, similar…
RuRAT campaign using innovative methods to get inside the system
RuRAT malware is being installed as part of a malicious drive; the malware allows remote access to affected devices. The attackers are masking as…
Who’s behind the Stalkerware network of compromising several phones?
Developed states are backing spyware that can remotely hack into iPhones. Governments are buying and using these hacking tools to target dissent—journalists, activists and…
Google is donating $15 million for the Ukraine crisis and is also targeting Russian media and people
Google said It’s helping those leaving Ukraine- war-affected regions. Google stated that Google.org and Google employees are donating $15 million for relief efforts in…
Pentest as a service Platform: What’s new with Bugdazz 2.0.1?
Pentest as a service platform helps to smoothly manage pentests. Bugdazz 2.0.1 has been released, and it has several improvements over its previous version.…