Researchers from ESET have discovered a malware operation that preys on Chinese speakers in Southeast and East Asia, paying for deceptive ads appearing in…
Chrome
Hackers penetrate gaming companies using the new IceBreaker software.
Researchers have given the backdoor IceBreaker the name because it appears to be used by hackers to attack internet play and gambling businesses. The…
Samsung Galaxy Store App Is Vulnerable to Fraudulent App Installs
Two security holes have been identified in the Samsung Galaxy Store programme for Android, which a local attacker might use to install arbitrary apps…
Hook A new Android spyware allows hackers to manipulate your phone remotely.
Cybercriminals are marketing a new Android spyware called “Hook,” claiming it can remotely control mobile phones in real-time using VNC (virtual network computing). Hook…
Canadian Liquor Stores Hit by New Credit Card Hack
On Wednesday, the Liquor Control Board of Ontario (LCBO), a Canadian government enterprise, faced a cyber attack – a credit card hack. The country’s…
Pink APT Group: Malware Threat Spotlight
A new advanced threat actor, Dark Pink APT by Group-IB and Saaiwc Group by Anheng Hunting Labs, has been identified as the source of…
Google Roulette: XSS in Chromium browsers can be activated by a developer console trick
An example of how difficult browser cybersecurity is. Suppose bad actors can fool Chromium browser users into submitting a straightforward JavaScript command in the…
Users of Mastodon are at risk of password-stealing attacks
A researcher has cautioned that a vulnerability in Anomaly, a fork of Mastodon, could allow hackers to obtain users’ password information. Mastodon has been…
SQLite Database Library Reported a 22-Year-Old Vulnerability
The SQLite database library has a high-severity vulnerability that was introduced as part of a code update that dates all the way back to…
Emotet Delivery and Evasion Techniques Used in Recent Attacks Revealed by New Report
According to recent research from VMware, emotet delivery and evasion techniques used in recent attacks revealed, threat actors linked to the infamous Emotet virus…