Mobile Security
Apple Services Restored After Brief Global Outage
Apple services, including the App Store, Apple TV+, and Apple Music, experienced a brief global outage, affecting users in the US and other regions....
Data Leaks
Over 17 Billion Personal Accounts Leaked Worldwide Since 2014
Data Leaks
admin - 0
Data breaches have become an increasingly prevalent threat globally, with a staggering 17 billion personal accounts compromised since 2014. This alarming figure represents a...
Confused Libra Shifts Attention to SaaS and Cloud for Extortion and Data Theft Incursions
Data Leaks
admin - 0
The entity identified as Confused Libra has been actively pursuing software-as-a-service (SaaS) platforms and cloud service provider (CSP) domains with the intent to pilfer...
An endeavor aimed at overtaking the OpenJS Foundation has been unearthed by security analysts, exhibiting resemblances to a recent discovery concerning the open-source XZ...
Cybercrime
TikTok to Suspend Repeated Offenders
Cybercrime
admin - 0
TikTok has announced a new policy aimed at tackling problematic content on its platform. The popular social media app, owned by ByteDance, will now temporarily suspend accounts that repeatedly violate its guidelines.
The new policy will see accounts that repeatedly post content deemed inappropriate or harmful being temporarily ineligible for...
Creators of Hive RAT and $3.5M Cryptojacking Mastermind Arrested in Global Operation
Cybercrime
admin - 0
In a global crackdown, authorities in Australia and the United States have apprehended two suspects allegedly involved in the creation and dissemination of a remote access trojan dubbed Hive RAT, formerly known as Firebird.
According to the U.S. Department of Justice (DoJ), this malicious software empowered its purchasers to wield...
Hackers Utilize Python Backdoor in Zero-Day Attack Targeting Palo Alto Systems
Cybercrime
admin - 0
Recently brought to public attention, malevolent entities have been taking advantage of an unveiled software flaw in Palo Alto Networks PAN-OS system since March 26, 2024, almost three weeks before its revelation on the preceding day.
Tracking this activity under the designation Operation MidnightEclipse, Palo Alto Networks' Unit 42 division...
Iranian MuddyWater Hackers Integrate New C2 Tool ‘DarkBeatC2’ in Recent Offensive
Cybercrime
admin - 0
The Iranian threat actor identified as MuddyWater has incorporated a novel command-and-control (C2) infrastructure termed DarkBeatC2 into its latest campaign. This tool joins a series of previously employed systems such as SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go.
Deep Instinct security researcher Simon Kenin noted in a recent technical report that despite...
Cyber Threat Landscape: Activists in Morocco and Western Sahara Under Siege
Cybercrime
admin - 0
A fresh wave of cyber threats is engulfing human rights activists in both Morocco and the Western Sahara region, orchestrated by a new threat entity employing phishing tactics to ensnare its victims into installing counterfeit Android applications and deploying credential-harvesting mechanisms tailored for Windows users.
Dubbed Starry Addax, this malicious...