Newly Purchased Android Phones With Pre-installed Malware Mimic as WhatsApp
A sophisticated cryptocurrency theft operation has been uncovered where brand-new Android smartphones arrive with pre-installed malware masquerading as legitimate WhatsApp applications.
Threat actors have infiltrated the supply chain of several Chinese smartphone manufacturers, embedding malicious...
Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users
A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms.
MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
Radiant Hacked – $50 Million USD Worth Crypto Stolen by North Korean Hackers
Radiant Capital, a prominent decentralized finance (DeFi) protocol, has fallen victim to a major security breach, resulting in the loss of approximately $50 million USD.
The attack, which exploited vulnerabilities in the devices of...
Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory
A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA).
On...
Rootkit Malware Exploiting 0-Day Vulnerabilities to Control Linux Systems Remotely
Fortinet researchers uncovered an advanced rootkit malware exploiting multiple zero-day vulnerabilities in enterprise appliances by executing a shell script (Install.sh).
The analysis sheds new light on how attackers establish persistence, hijack network traffic, and remotely...
Botnet Exploits 13,000 MikroTik Devices By Abusing Misconfigured DNS Records
Cybersecurity experts at Infoblox Threat Intel have uncovered a sophisticated botnet leveraging misconfigured DNS records to bypass email protection systems and deliver malware through spam campaigns.
This botnet, comprising approximately 13,000 compromised MikroTik routers,...
Hackers Weaponize Google Drive Links to Breach Corporate Networks
A sophisticated attack campaign targeting organizations in Japan and other East Asian countries. The threat actor, identified as APT-C-60, is employing a clever social engineering tactic that exploits job application processes to infiltrate corporate...
New Process Hollowing Attack Vectors Uncovered in Windows 11 (24H2)
The recent release of Windows 11 version 24H2 has introduced a range of new features and updates, but it has also raised significant cybersecurity concerns.
A longstanding malware technique known as Process Hollowing or RunPE...
North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects
North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages.
It is intended to steal information and load additional stages of malware, notably a multi-stage Python-based...
Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...
In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been linked to a massive rogue Remote Desktop Protocol (RDP) campaign.
Earth...