Malware

Toll Fraud Malware Warnings

Toll Fraud Malware Warnings on Android Device issued by Microsoft

Toll Fraud Malware Warnings on Android Device issued by Microsoft Microsoft has described the evolving powers of Android toll fraud malware apps, highlighting their “complex multi-step attack flow” and better security analysis evasion technique. Toll fraud is a type of billing fraud in which deceptive mobile applications lure unsuspecting users into paying for premium content […]

Toll Fraud Malware Warnings on Android Device issued by Microsoft Read More »

Access:7 vulnerabilities impact

Critical Access:7 Vulnerabilities Impact ATMs, Medical, IoT devices

Critical Access:7 Vulnerabilities Impact ATMs, Medical, IoT devices As many as seven security vulnerabilities have been disclosed in PTC’s Axeda software that could be weaponized to gain unauthorized access to medical and IoT devices. They are referred to as the “Access:7” vulnerabilities Brief Explanation of the Access:7 Vulnerabilities Three of the vulnerabilities, collectively referred to

Critical Access:7 Vulnerabilities Impact ATMs, Medical, IoT devices Read More »

Mélofée - New Linux Malware

Mélofée – New Linux Malware Linked to Chinese APT Groups

Mélofée – New Linux Malware Linked to Chinese APT Groups A new piece of malware targeted at Linux servers has been connected to an unidentified Chinese state-sponsored hacking organization. ExaTrack, a French cybersecurity company, discovered three examples of the previously reported malicious software in early 2022 and gave it the name Mélofée. Mélofée implant analysis

Mélofée – New Linux Malware Linked to Chinese APT Groups Read More »

Emotet Rebirth

Emotet Rebirth with New Features and how to Spot them

Emotet Rebirth with New Features and how to Spot them One of the most deadly and well-known threats has reappeared. The botnet was decommissioned by global authorities in January 2021. The Emotet’s executables received a destructive upgrade from law enforcement. And it appeared that the trojan’s story had come to a close. But the malware

Emotet Rebirth with New Features and how to Spot them Read More »

What is a Zero-day Attack? – How does Zero-day Attack Work

What is a Zero-day Attack? – How does Zero-day Attack Work? “Zero-day” refers to newly found security vulnerabilities that hackers can exploit to attack systems. Since the vendor or developer has just become aware of the flaw, they have “zero days” to correct it, hence the term “zero-day.” A zero-day attack takes place when hackers

What is a Zero-day Attack? – How does Zero-day Attack Work Read More »

Zero-Day Vulnerabilities

Apple Release Zero-Day Vulnerabilities Patch for its Devices

Apple Release Zero-Day Vulnerabilities Patch for its Devices This is the 13th zero-day vulnerability that Apple has patched since the beginning of the year. On Monday, the company released an urgent security update for iOS, iPadOS, and macOS to handle the issue. The updates address a memory corruption vulnerability (CVE-2021-30807) in the IOMobileFrameBuffer component, a

Apple Release Zero-Day Vulnerabilities Patch for its Devices Read More »

2 Zero-Day Bugs Attack Zoom Clients

2 Zero-Day Bugs Attack Zoom Clients and MMR Servers

2 Zero-Day Bugs Attack Zoom Clients and MMR Servers Two zero-day bugs in the clients and Multimedia Router (MMR) servers of Zoom, a video calling service, have recently been thoroughly analyzed by security experts. These vulnerabilities could give attackers access to arbitrary codes of your product’s memory, cause your service or application to crash, or

2 Zero-Day Bugs Attack Zoom Clients and MMR Servers Read More »

Malvertisers Exploits WebKit Zero-Day Vulnerability

Malvertisers Exploits WebKit Zero-Day Vulnerability

Malvertisers Exploits WebKit Zero-Day Vulnerability Malvertisers Exploits WebKit Zero-Day Vulnerability – Redirect Browser Users to Scam Pages An advertising cybersecurity firm called Confiant discovered a malvertising campaign last year that was taking advantage of what turned out to be a zero-day vulnerability in the WebKit browser engine. Using a zero-day vulnerability in WebKit-based browsers, the malvertisers

Malvertisers Exploits WebKit Zero-Day Vulnerability Read More »

FluBot and TeaBot Malware Campaigns

FluBot and TeaBot Malware Campaigns Attacks Androids

FluBot and TeaBot Malware Campaigns Attacks Androids Since the beginning of December, researchers from the Bitdefender Mobile Threats team claim to have intercepted over 100,000 malicious SMS messages trying to spread Flubot malware. The Romanian cybersecurity company outlined its findings in a report released on Wednesday. “Findings suggest attackers are modifying their subject lines and

FluBot and TeaBot Malware Campaigns Attacks Androids Read More »