New features to take over smartphones and monitor user activity demonstrate the continued evolution of the malware, which is now being spread on GitHub. The […]
Securden Unified PAM Flaw Allows Attackers to Bypass Authentication
Securden Unified PAM is a comprehensive privileged access management platform that is used to store, manage, and monitor credentials across human, machine, and AI identities […]
New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands
Zimperium’s zLabs research team has identified a sophisticated new variant of the Hook Android banking trojan, marking a significant escalation in mobile threat sophistication. This […]
Google Introduces Enhanced Developer Verification for Play Store App Distribution
Google has announced that all Android apps installed on approved devices will soon need to be able to be traced back to a verified developer […]
OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks
CYFIRMA researchers have uncovered a campaign they have codenamed “OneFlip”, an operation that demonstrates how a single-bit modification inside a seemingly benign file can be […]
NIS2 und der Mittelstand: Zwischen Pflicht und Praxis
Cyberkriminalität ist und bleibt ein einträgliches Geschäft – eines, das zu einem wachsenden Problem wird. Knapp 179 Milliarden Euro Schaden sind in Deutschland im Jahr […]
Rache am Arbeitgeber bringt Entwickler vier Jahre in den Knast
Welche Konsequenzen es haben kann, wenn technisch versierte IT-Fachkräfte zum Innentäter werden, hat die Eaton Corporation am eigenen Leib erfahren. JHVEPhoto | shutterstock.com Wenn unzufriedene […]
DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the […]
Big-Tech-Zulieferer meldet Ransomware-Attacke
Der Anbieter für Programmiersysteme Data I/O wurde kürzlich von einem Cyberangriff getroffen. Dabei wurden möglicherweise Daten gestohlen. janews – shutterstock.com Data I/O bietet Programmierlösungen für […]
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers
Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity […]