Antidot Trojan Threatens Android Users
Antidot Trojan mimics Google Play updates to steal data. It uses VNC, keylogging, and encryption to evade detection. Advanced communication…
Cybersecurity News Weekly Recap
Russian APT hackers target critical infrastructure with sophisticated malware. Exploiting software vulnerabilities continues to be a major threat vector. Over…
Hackers Deploy New Loader LATRODECTUS
LATRODECTUS loader bypasses security and evades detection. It shares techniques with ICEDID, indicating evolving threats. Email campaigns distribute the malware…
Researcher Identifies TeslaLogger Vulnerability
A vulnerability was found in TeslaLogger that could allow unauthorized access. Default credentials and insecure settings were the primary cause.…
Threat Intelligence Feeds Assist Security Teams
Threat intelligence feeds provide real-time updates on cyber threats. Commercial feeds offer more reliable data than open-source feeds. Integration into…
YARA-X Enhances Malware Detection
YARA-X introduces enhanced malware detection performance. Improved reliability and security with Rust implementation. YARA-X is stable and ready for user…
Cyber Attackers Target AI Research
SugarGh0st RAT targets AI research in the U.S. Attack employs AI-themed phishing emails. Collaboration aids in identifying threats effectively.
CISA Releases Encrypted DNS Guidance
New CISA guidance mandates encrypted DNS for federal agencies. FCEB agencies must encrypt DNS traffic by fiscal year 2024. The…
Microsoft Demands MFA for Azure Users
Microsoft mandates MFA for all Azure users from July. This move enhances security and ensures compliance with regulations. Users are…
Darkgate Malware Threatens Windows Systems
Darkgate malware targets Windows systems using trusted file formats. Phishing emails with harmful attachments initiate the malware attack. Legitimate system…