Cyber Security

CherryBlos, the malware that steals cryptocurrency via your photos – what you need to know

What's the deal with CherryBlos? CherryBlos is a rather interesting family of Android malware that can plunder your cryptocurrency accounts - with a little...

Google Online Security Blog: MTE

Posted by Andy Qin, Irene Ang, Kostya Serebryany, Evgenii Stepanov Since 2018, Google has partnered with ARM and collaborated with many ecosystem partners...

Police takes down BulletProftLink large-scale phishing provider

The notorious BulletProftLink phishing-as-a-service (PhaaS) platform that provided more than 300 phishing templates has been seized, the Royal Malaysian Police announced. The operation started in 2015 but...

Russian Hackers Sandworm Cause Power Outage in Ukraine Amidst Missile Strikes

Nov 10, 2023NewsroomCyber Warfare / Network Security The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a...

State of Maine Becomes Latest MOVEit Victim to Surface

In an online overview published on Nov. 9, the government of Maine confirmed that a group of cybercriminals exploiting the now-infamous vulnerability in...

Who’s Behind the SWAT USA Reshipping Service? – Krebs on Security

Last week, KrebsOnSecurity broke the news that one of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal...

Microsoft and SysAid Find Clop Malware Vulnerability

SysAid has patched a zero-day vulnerability that could allow attackers to exfiltrate data and launch ransomware. ...

Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)

The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ...

Latest articles