Nation-state actors are using specialised malware to maintain access to industrial control systems (ICS) and supervisory control and data acquisition (SCADA) equipment, according to the US government. In an alert, numerous US agencies stated that “APT actors have created custom-made…
Latest posts - Page 64
Fakecalls: A Novel Approach to Banking Customer Service Frauds
Fakecalls is a financial malware that targets Android users, hijacking their calls to a bank’s customer service number and connecting them directly with hackers. About Fakecalls scam The spyware, according to Kaspersky, masquerades as a mobile app from well-known banks…
Operation TOURNIQUET shuts down RaidForum, an illegal dark web marketplace
RaidForums, an illegal dark web marketplace, has been closed, and its infrastructure seized in an international law enforcement Operation TOURNIQUET. Europol’s European Cybercrime Center has coordinated the operation. The Department of Justice, in a press release, announced the taking down…
Parrot Traffic Direction System (TDS) is a new web redirection service by Parrot
In harmful campaigns, a Traffic Direction System (TDS) is used to lead individuals who fit a specific profile to phishing sites. The FakeUpdate campaign Avast researchers found Parrot TDS and revealed that it’s presently being utilised in the FakeUpdate (aka…
Google drags fake-puppy-website scammer to court
On Monday, Google said that it’s suing a threat actor who has been tracked operating fraudulent websites to dupe people into buying puppies that don’t exist. “The actor used a network of fraudulent websites that claimed to sell basset hound…
Access control vulnerability in Easy! Appointments platform exposed sensitive personal data
Unprotected API could expose names, places, times of bookings made using app An open-source scheduling platform has an access control vulnerability. Unauthenticated attackers had easy access to personally identifiable information (PII) thanks to Easy!Appointments, according to a security researcher. The…
Human factors are still a major issue for organisations
Egress reports that 56% of IT leaders say their non-technical staff are partially prepared or not at all prepared for a security attack. A survey of 600 hundred IT security leaders from several industries regarding organisations’ security posture in a…
FFDroider and Lightning info-stealers are targeting users in the wild, according to researchers
FFDroider and Lightning Stealer are two different information-stealing malwares that are capable of syphoning data and initiating subsequent attacks, according to cybersecurity analysts. In a paper published last week, Zscaler ThreatLabz researchers Avinash Kumar and Niraj Shivtarkar stated, “Designed to…
Malware targeting the AWS Lambda serverless platform has been identified for the first time
Cado Security researchers claim to have identified the first publicly known malware targeted against Amazon Web Services’ serverless computing technology, AWS Lambda, indicating a new cloud vulnerability that organisations should be aware of. “Because serverless is such a new technology,…
Hackers are distributing fake shopping apps to steal Malaysian users’ banking information.
Hackers are distributing fake shopping apps to steal Malaysian users’ banking information. Since at least November 2021, threat actors have been distributing malicious applications disguised as seemingly harmless shopping apps to target customers of eight Malaysian banks. The attacks involved…