Cyber security news for all

More

    Mobile Security

    An endeavor aimed at overtaking the OpenJS Foundation has been unearthed by security analysts, exhibiting resemblances to a recent discovery concerning the open-source XZ...

    TikTok to Suspend Repeated Offenders

    TikTok has announced a new policy aimed at tackling problematic content on its platform. The popular social media app, owned by ByteDance, will now temporarily suspend accounts that repeatedly violate its guidelines. The new policy will see accounts that repeatedly post content deemed inappropriate or harmful being temporarily ineligible for...

    Creators of Hive RAT and $3.5M Cryptojacking Mastermind Arrested in Global Operation

    In a global crackdown, authorities in Australia and the United States have apprehended two suspects allegedly involved in the creation and dissemination of a remote access trojan dubbed Hive RAT, formerly known as Firebird. According to the U.S. Department of Justice (DoJ), this malicious software empowered its purchasers to wield...

    Hackers Utilize Python Backdoor in Zero-Day Attack Targeting Palo Alto Systems

    Recently brought to public attention, malevolent entities have been taking advantage of an unveiled software flaw in Palo Alto Networks PAN-OS system since March 26, 2024, almost three weeks before its revelation on the preceding day. Tracking this activity under the designation Operation MidnightEclipse, Palo Alto Networks' Unit 42 division...

    Iranian MuddyWater Hackers Integrate New C2 Tool ‘DarkBeatC2’ in Recent Offensive

    The Iranian threat actor identified as MuddyWater has incorporated a novel command-and-control (C2) infrastructure termed DarkBeatC2 into its latest campaign. This tool joins a series of previously employed systems such as SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. Deep Instinct security researcher Simon Kenin noted in a recent technical report that despite...

    Cyber Threat Landscape: Activists in Morocco and Western Sahara Under Siege

    A fresh wave of cyber threats is engulfing human rights activists in both Morocco and the Western Sahara region, orchestrated by a new threat entity employing phishing tactics to ensnare its victims into installing counterfeit Android applications and deploying credential-harvesting mechanisms tailored for Windows users. Dubbed Starry Addax, this malicious...

    Malware & Threats

    Most Popular

    Stay on op - Ge the daily news in your inbox

    Latest Articles