27 Feb 2022 may be the year cybercrime returns its focus to consumersThreat analysts expect 2022 to be the tipping point for a shift in the focus of hackers from large companies back to consumers. […]
26 Feb Ukraine recruits “IT Army” to hack Russian entities, lists 31 targetsUkraine is recruiting a volunteer “IT army” of security researchers and hackers to conduct cyberattacks on thirty-one Russian entities, including government agencies, critical infrastructure, and banks. […]
26 Feb Free Android app lets users detect Apple AirTag trackingA small team of researchers at the Darmstadt University in Germany have published a report illustrating how their AirGuard app for Android provides better protection from stealthy AirTag stalking than other apps. […]
25 Feb TrickBot malware operation shuts down, devs move to stealthier malwareThe TrickBot malware operation has shut down after its core developers move to the Conti ransomware gang to focus development on the stealthy BazarBackdoor and Anchor malware families. […]
25 Feb TrickBot malware operation shuts down, devs move to BazarBackdoorThe TrickBot malware operation has shut down after its core developers move to the Conti ransomware gang to focus development on the stealthy BazarBackdoor and Anchor malware families. […]
25 Feb GPU giant Nvidia is investigating a potential cyberattackUS chipmaker giant Nvidia confirmed today it’s currently investigating an “incident” that reportedly took down some of its systems for two days. […]
25 Feb Ransomware gangs, hackers pick sides over Russia invading UkraineHacker crews are picking sides as the Russian invasion into Ukraine continues, issuing bans and threats for supporters of the opposite side. […]
25 Feb NHS urges orgs to apply security update for Okta Client RCE bugThe UK’s NHS Digital agency is warning organizations to apply new security updates for a remote code execution vulnerability in the Windows client for the Okta Advanced Server Access authentication management platform. […]
25 Feb Visual Voice Mail on Android may be vulnerable to eavesdroppingA security analyst has devised a way to capture Visual Voice Mail (VVM) credentials on Android devices and then remotely listen to voicemail messages without the victim’s knowledge. […]
25 Feb Jester Stealer malware adds more capabilities to entice hackersAn infostealing piece of malware called Jester Stealer has been gaining popularity in the underground cybercrime community for its functionality and affordable prices. […]